Hello participants of Mailing List. Since 2006 I publish security reports about hackers activity in Uanet and since 2012 I begun publishing reports about web applications at infected web sites (among all my reports). About which I wrote in WASC Mailing List.
In my publication The state of infection in Uanet 1h 2013 (http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2013-October/008906.html) I wrote you about the state of infection in Uanet in the 1st half year of 2013. Now I want to tell you about the state of infection in Uanet in the second half and totals of 2013 (http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2014-April/009018.html). After publishing the results of hackers activity in Uanet for the second half of 2013, I have published separate reports concerning state of malware. Among my reports there are the next: - Web applications at infected web sites in the second half of 2013 http://websecurity.com.ua/7089/ - Web applications at infected web sites in 2013 http://websecurity.com.ua/7096/ This information can be interesting for you. Here is summary for the whole 2013 year from my report. The next engines (which were identified) were used at web sites infected last year: Joomla - 54 DataLife Engine - 13 WordPress - 13 Drupal - 4 CMS - 3 CNCat - 2 eM&IS-manager - 2 Elite-Board - 2 Gloowi Engine - 2 I-Soft Bizness - 2 ocStore - 2 UGCS CMS - 2 ArtDesign CMS - 1 Artefact St. CMS - 1 Bitrix Site Manager - 1 CMS Danneo - 1 CMS IT-Project - 1 CodeIgniter - 1 Global Vision CMS - 1 MODx - 1 osCommerce - 1 PHP-Fusion - 1 SmallNuke - 1 vBulletin - 1 Vivvo CMS - 1 WebAsyst Shop-Script - 1 Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/