Anna Bofill Bert

Imunify360 reduces hacking attempts by 90%

If you're using a well-known website antivirus and anti-malware solution, you wouldn't expect to be hacked on average 12 or so times per month, would you? Well, yes, you would, but only if that well-known name isn't Imunify360 . This was the case at Yourname.nl , a Dutch hosting provider offering cost-efficient WordPress and Joomla hosting for SMBs and individuals. Their customers' sites were being compromised around 3 times a week, even though they'd tried vanilla ModSecurity and a widely marketed website security solution provider. When they installed Imunify360, their cybersecurity incidences went down by over 90%. While it is easy to calculate the reduction in infiltration attempts, it i...
Continue reading
Oleg Boytsev

How our InfoSec Professionals stay one step ahead

Stay in the light; be aware of the dark. Anonymous 'Know your enemy' is an overused cliche in the cybersecurity industry. We take a broader view: Know your world, and your place in it.  Our team knows the hacking world. We've recruited ethical hackers, OSCP-certified engineers, and seasoned IT professionals, all of whom are watching the dark web and its subversive operatives, watching how threats evolve and how attacks are planned. We routinely monitor zero-day exploits, examining use-cases thoroughly and responding with robust mitigation strategies. The fruits of intensive research and development are augmented by both human experience and machine learning. This sharpens our ability to...
Continue reading
Andrey Kucherov

Host your website safely and avoid website cross-contamination issues

By Andrey Kucherov, Malware Analyst at Imunify360.  This article discusses the hidden pitfalls of hosting multiple websites on one hosting account, and how you can remediate the consequences of website cross-contamination. The structure of virtual hosting (also known as shared hosting) can be illustrated by a bee hive: each website (bee) has its own folder (cell). At the same time, all bees share the same hive (hosting account resources, such as disk space, database, RAM, CPU, etc.). In most cases, hosting companies do not provide resource isolation for shared hosting accounts (plans that let you host multiple websites on one account). In practice, that means that all website files are ...
Continue reading
Greg Zemskov

New ISPmanager Lite panel with ImunifyAV

​For ISPmanager panel users, Revisium Antivirus changes its name to ImunifyAV , keeping its reputation as a popular and effective malware and virus scanner. Today, ISPsystem release a new version of their ISPmanager Lite hosting panel. This version comes pre-installed with ImunifyAV , the new name for Revisium Antivirus. With it, you can scan an unlimited number of websites and users per server, do automatic malware cleanup and create schedules for scanning. You can also get email alerts about any website infections. You can find ImunifyAV in the Tools menu: ​ If a user doesn't have an antivirus solution already configured, ImunifyAV becomes the default for that panel. Otherwise, a system ad...
Continue reading
Greg Zemskov

Why do small sites get hacked?

If you think your site won't be hacked because it's too small to matter, think again. I'll show why that is a false and dangerous assumption. Many site owners and webmasters think that hackers only care about popular, highly-ranked websites. They are wrong. High traffic volume helps boost earnings on partner programs by redirecting visitors to other sites, gets more views of unauthorized advertisements and attracts more clicks on rogue links. But that is not the only way hackers make money. Unprotected sites with low traffic volume are equally attractive to hackers. It is the way they are used that differs from how hackers monetize more popular websites. Any normal site, with an audience of ...
Continue reading
Greg Zemskov

Opsani VCTR is now Imunify QuickPatch, the free, vulnerability evaluator for Plesk

If you use Plesk, you'll know it's one of the leading control panels for web hosters and resellers, and one that supports Opsani VCTR, or, to give its new name, Imunify QuickPatch . Here's an introduction to what it does and why you need it if you care about the security of hosted websites. Making sure your system and its packages are up to date is a fundamental strategy for keeping systems secure. The problem is in the management overhead this creates. The packages and configurations of each system must be regularly checked and updated*. Imunify QuickPatch does this for you. Imunify QuickPatch is free. It scans and analyzes your system for security issues. Imunify QuickPatch analyzes server...
Continue reading
Greg Zemskov

Revisium Antivirus becomes ImunifyAV in Plesk

Plesk panel users will soon notice a change in their panels. For Plesk panel users, Revisium Antivirus changes its name to ImunifyAV , keeping its reputation as a popular and effective malware and virus scanner, and joining the Imunify360 security solution for complete protection of Linux Web servers. As with its previous version, ImunifyAV comes in free and paid versions. The free ImunifyAV efficiently scans websites and detects all kinds of malware. Use it for an unlimited number of scans on all websites on a server. ImunifyAV+ is the paid upgrade that does this and more, with a one-click automated cleanup option for full sanitization of entire servers, effortlessly. Both versions have an ...
Continue reading
Andrey Kucherov

What to do if your Website is Hacked: A Disaster Recovery Plan

Thousands of websites get hacked on a daily basis. Actually, thousands out of the many billions of websites on the Internet is quite a low percentage, but if you got unlucky and your website is among those, you need to take it seriously, and respond to the threat quickly and wisely. Unfortunately, very often, website owners are 100% sure that they won't ever be a victim, and do not have a valid disaster recovery plan for such cases. Or, if they do, the plan consists of just one bullet point: I was unlucky and the plan is to shut down my business. In this article, I cover that gap and offer you a solid disaster recovery plan if your website got hacked. Once Upon a Time, a Website Got Hacked… ...
Continue reading
Oleg Boytsev

Imunify360 protects against a critical vulnerability in Van Ons WP GDPR Compliance WordPress plugin (CVE–2018–19207)

The popular Van Ons WordPress plugin for GDPR compliance, with more than 100,000 active installations, was patched on November 7th due to a privilege escalation vulnerability ( CVE–2018–19207 ) found in version 1.4.2. The WP GDPR Compliance plugin helps website owners meet the recent GDPR European data privacy regulation. This came into effect in May of this year, boosting the plugin's popularity. Starting on 10th November, our Threat Intelligence Group noticed a surge in attacks targeting this exploit vector.   Imunify360 customers were already protected by a WAF rule issued several days earlier. This rule detects and blocks malicious payloads attempting to exploit this attack vector. ...
Continue reading
Greg Zemskov

ImunifyAV: The Free, Powerful, Malware Scanner (now in Beta for cPanel and DirectAdmin)

Keeping watchful is the first step towards effective security; keeping malicious code out of your websites is essential to protect them. I'm excited to let you know about ImunifyAV, our powerful new malware scanner. It's currently available in beta for cPanel and DirectAdmin panels. I'm also happy to tell you it's free and will always be free (as in forever). Here's more about it. ​ ImunifyAV detects all kinds of malware in all types of files —it doesn't matter whether your websites are based on PHP (like WordPress, Joomla and Drupal), or built with classic, static HTML. Our advanced de-obfuscation techniques let it detect malicious code hidden in files using encryption or encoding. ImunifyA...
Continue reading
Greg Zemskov

How Spammers Spam

Twenty years on and spam is still a problem. I'll look at why that is and what we can do to reduce or prevent it. Contrary to popular belief, hacking a site and uploading malicious scripts onto it is not the only way spamming gets a foothold. There are other ways. For example, it could be because of a compromised account, the use of script vulnerabilities, or an incorrectly configured mail server. The diagram below shows an overview of the methods. ​ In this article, I'll look at the different ways unsolicited email (spam) can emanate from a web server, and some of the ways you can stop it. Spamming by hacking A hacked site or server is the most common reason behind an outbreak of spamming a...
Continue reading
Greg Zemskov

Why Does Site or Server Load Increase?

There's only one good reason why the load on your hosting server starts increasing–the rest are bad. I'll look at how and why they all happen. I was often contacted by site owners who had a problem with high server load. This common condition is first noticed when an owner gets a warning message from their hosting company. Such messages can be precursors to the blocking of the site, and it can happen to almost any site owner or webmaster. This article covers the different reasons why the load on a site or server might be increasing, and what can be done about it. Webmasters usually find out about excess load from their hosters. Hosting companies regulate and control resource usage for each h...
Continue reading
Greg Zemskov

Patterns of thought: the psychology of weak passwords

In this article, I look at why webmasters, site administrators and their users choose and use weak passwords. Later, I recommend ways to create passwords that are reliable and resistant to brute-force attacks. Warnings that the internet is increasingly an unsafe environment appear with alarming regularity in studies commissioned by companies specializing in information security. The growing number of web attacks and the increasing activity of the hacker community require a new discipline and focus on security. But while cybersecurity experts are talking about high technology and advanced protection, it seems a rudimentary rule has been forgotten: the use of strong passwords. Unreliable passw...
Continue reading
Paul Jacobs

Drupalgeddon Updates to 2.0 - Shouldn’t you update too?

The latest wave of Drupalgeddon activity highlights the importance of keeping software up to date, especially when it's a popular CMS like Drupal , itself based on the rapidly changing web development programming language PHP and the widely used open source RDBMS MySQL. Our Analyst's Insight into this vulnerability gives more details. Imunify360 defends against this threat by virtue of a sophisticated WAF rule set developed and maintained by our own threat intelligence team. Larger vendors' rulesets are too general and too inflexible to track such dynamic threats. Another component in Imunify360's layered security defenses is called Proactive Defense. It uses comprehensive heuristics to dete...
Continue reading
Oleg Boytsev

Drupalgeddon 2.0: Analyst’s Insight

Activity Our monitoring systems identified a first-wave malicious campaign on April 12th, 2018, the same day that proof of concept code went public. The Drupal core security team had earlier released security advisory SA-CORE–2018–002 on the 28th March. We released our blocking and detection rules a few days later meaning that Imunify360 customers were already protected by the time the campaign started. October saw a new burst of attacks on this vector. Botnets located on thousands of IPs requested access to Drupal-based sites to upload a malicious payload. The chart below shows the activity levels for the past few months. Recognition Most connections were attempting to extract the server's ...
Continue reading
Greg Zemskov

Avoid Multi-Site Hacking – Part 2

In Part 1 , we looked at security isolation as a technical solution for preventing infections on one site spreading to neighboring sites in multi-site hosting systems. In Part 2, we'll consider other non-technical ways to beef up multi-site protection. Site security = technical protection + organizational measures If you don't use security isolation on sites in the same hosting account, you should at least give each site its own account. However, this is often impossible, as the combined sum of each site's content resource needs (disk, memory) is too great. This is where the next elements of complex security come in. I call them organizational measures . Here are some examples. ​ Secure work...
Continue reading
Greg Zemskov

Avoid Multi-Site Hacking – Part 1

Running shared or VPS servers has risks. When one site is hacked, neighbors succumb shortly after. In this two-part article, I'll explain the risks in detail and what you can do to mitigate them. Shared hosting and VPS servers allow you to host several sites within one user account. If you're a webmaster, a web studio, an Internet agency, or a business owner, you do this not only for convenience but also to save money, as it is cheaper than buying separate accounts for each site. But there's a problem. Multi-site accounts are vulnerable to hacking and the subsequent infection of the entire hosting account. Often, there are dozens of "patients" (tenants) on the same site who urgently need tre...
Continue reading
Kirill Bykov

One-click automatic malware cleanup in Imunify360 beta

Today we are releasing the latest beta version of Imunify360. Along with other features mentioned here , it comes with a major new addition: one-click automatic malware cleanup functionality. We are leveraging the power of our recent acquisition, Revisium's market-leading malware scanning engine, to find and automatically fix malware-infected files. Now you can rid your websites of infections with a single click. This is an indispensable feature, especially for servers with many websites, because it eliminates the headaches usually associated with manual cleanups and customer support issues. And don't forget that Imunify360's six-layer security stops almost all attacks . Its new Proactive De...
Continue reading
Inna Gordin

Imunify360: The only option for all-around proactive web security

As a hosting provider, you have choices in the security space. We at CloudLinux know them and we know the hosting market well. Over the years, we've met with and spoken to a lot of hosting providers, to understand their needs, and to deliver solutions specifically for them. Naturally, we looked at the other leading security solutions to see how they compared to Imunify360 . Here's what we found. One license covers all sites on the server If you own a server, you only need one Imunify360 license for all the sites hosted on it. As a hosting provider, you have the freedom to up-sell to site owners or include it as part of their package. Other solutions charge per hosted site , not per server. N...
Continue reading
Paul Jacobs

Why every month should be National Cybersecurity Awareness Month

This month, October 2018, in the US it is the 15th National Cybersecurity Awareness Month . Another month, another 'awareness' . Does this suppose that all the other 11 months we should be less aware? Do hackers make a special effort to be nicer in October? Do they leave love letters on your server instead of malware? Does it help if you live on Tokelau*? No. EVERY month is cybersecurity awareness month, and every week and every day and every second of every day, everywhere. Because cyber attacks are automated. Hackers are using scripts and scalable tools to do the grunt work, the same way you make scripts to automate tedious tasks on your servers. Here's a recipe for success this cybersecur...
Continue reading