8 comments

  • tyingq 9 days ago
    > This indicates to me that someone with access to Georgia’s servers did this on an Apache level, instead of within WordPress

    Assuming you've breached WordPress, and can run arbitrary php, you can produce that kind of result. I think that path is more likely/common.

  • djoldman 10 days ago
  • WaitWaitWha 9 days ago
    I do not read any industry standard disclosure details for this.

    Was this reported to the site owners (https://gema.georgia.gov/get-involved/report-cybersecurity-e...) and appropriate government law enforcement agencies (https://www.cisa.gov/report)?

    I do see a call to share other incidents to the blog owner.

    • internetter 9 days ago
      As stated in the post, I contacted the listed email exactly one year ago. I did not contact law enforcement — I did not consider it to be my place

      Edit: and I’m not sure standard disclosure even applies. I’m just talking about IOCs, not the actual attack vector (which I do not know)

      • devmor 9 days ago
        If you’re interested in getting more eyes on it, might I suggest reaching out to the newspaper the Atlanta Journal Constitution?
    • DanAtC 9 days ago
      Full disclosure if you're a good guy, no disclosure if you're bad.

      "Responsible" disclosure is anything but.

      • WaitWaitWha 9 days ago
        Can you elaborate on your note?

        Asking because I had multiple bad experiences with responsible disclosure, yet I do not believe full (public presumably) disclosure is the right initial path.

        • DanAtC 9 days ago
          "Responsible" disclosure at best results in an embargo where "trusted" parties get to sit on it while the general public remains at risk. Worst case you get the cops knocking at your door.

          (Full disclosure should be done anonymously to prevent the latter from happening anyway)

          • afavour 9 days ago
            But full disclosure places the general public at greater risk than responsible disclosure.
            • michaelt 9 days ago
              Let's say hypothetically someone found this hacked website, sent an e-mail to the site owners' security reporting contact, and after a year they hadn't taken any action.

              Some would say a "responsible" disclosure which allows the danger to continue unabated for a year is a greater danger than a public disclosure, which would lead to the danger being fixed.

              • afavour 9 days ago
                That is one hypothetical scenario, yes. Another hypothetical scenario is that as a result of responsible disclosure the site owners patch the hole and ensure customer data isn't publicly accessible before the vulnerability is public knowledge.

                Seems reckless to me to not even _try_ responsible disclosure. You don't have to wait a year. But at least give a chance for the problem to be solved before you make it common knowledge.

                • michaelt 9 days ago
                  Did I say hypothetically? Sorry, I meant to say exactly as happened [1]

                  :)

                  [1] https://news.ycombinator.com/item?id=40169334

                  • afavour 9 days ago
                    Right, so that’s a dataset of 1. Are you suggesting responsible disclosure never works because of your one time experience?
                    • michaelt 9 days ago
                      Of course not. I agree that responsible disclosure works perhaps 10% of the time.

                      It's the 90% of the time, when it doesn't work, that's the problem.

            • lynx23 9 days ago
              Only in the very short term. In mid-to-long term it increases the incentive to actually roll out a fix sooner then later.
              • busterarm 9 days ago
                Or you can possibly decide to shut down whatever service is vulnerable.
        • busterarm 9 days ago
          Responsible disclosure creates a ton of perverse incentives for all parties and ultimately leaves customers worse-off. Bug bounty programs and all of the drama and exploitative labor issues fall into this pit.

          Full disclosure might have short-term negatives for _companies_ involved but is best for customers/users as it allows them to evaluate and implement their own mitigations as early as possible. It's the only truly ethically consistent way to operate.

          • cqqxo4zV46cp 9 days ago
            This really sounds like you’re back-solving from a pre-existing ideology of complete openness. A customer’s ability act early, e.g. mitigate, is quite clearly context-dependent. I can think of vendors I interface with as a customer that I’d prefer had vulnerabilities ‘responsibly disclosed’ to them. Nothing in technology is this simple. The absolute nature of your claims make it near impossible to actually take this seriously.
  • batch12 10 days ago
    These looked like cached search results. I am not seeing the IOCs on the live site unless I am missing it or they're only showing them to googlebots.

    One can see the results by searching google for the domain and the "gold" string from the article.

    • eli 9 days ago
      This is standard practice for hacked wordpress sites. They only serve the compromise to organic search traffic.
      • ljp_206 9 days ago
        Yes, I have heard this called a link cloaking hack, methinks.
    • internetter 10 days ago
      Thank you for bringing this up! The plot thickens: https://shottr.cc/s/1CXn/SCR-20240426-cm4.png
      • ceejayoz 9 days ago
        This is why it's fairly common for people to say "Google says my site is hacked, but when I check it's fine!" on webdev forums.
    • internetter 10 days ago
      Clicking the link from the google search results continues to work, I just tested it on my phone. Visiting the page directly continues to redirect for me
      • wil421 10 days ago
        If you think the site is still serving the redirects I’m going to make a phone call to a publicly available number of some Cyber Crime division for Georgia’s GBI.
        • Symbiote 10 days ago
          From the screenshot linked above:

            curl -i -H 'Referer: google.com' https://team.georgia.gov/medicicnes/kamagra-gold-100/
            HTTP/1.1 301 Moved Permanently
            Date: Fri, 26 Apr 2024 12:36:14 GMT
            Server: Apache/2.4.6 (CentOS)
            X-Powered-By: PHP/7.4.33
            Location: https://gomylink.site/vkKXXr8G?sub1=kamagra-gold-100&sub2=team.georgia.gov
            Connection: close
            Transfer-Encoding: chunked
            Content-Type: text/html; charset=UTF-8
          • batch12 9 days ago
            Good find- I was on my mobile at the time so couldn't dig this deep so I am happy to see someone figured it out.
        • internetter 10 days ago
          • mdorazio 10 days ago
            I tried the first 5 links and none of them showed the hacked content in the resulting page. At least for me the Google results were all old caches.
          • qingcharles 9 days ago
            Worked for me with no changing of any referrer or other HTTP settings. Clicking on the first georgia.gov resulted redirected me to the spam site. (Win11 + Chrome)
  • nojvek 9 days ago
    referrer google or user agent google bot is a great way to have google specific shenanigans to rank higher in search.

    Google says it's against their policy but plenty of sites do that. Plenty of sites let their paywalls down just for GoogleBot to the ranked in search but real users have to pay.

    Some sites don't load ad crap to show GoogleBot how fast they are.

    We should all become GoogleBot.

  • caymanjim 10 days ago
    [flagged]
    • internetter 10 days ago
      What? I have proof it’s not dynamically generated. The rest of the website is powered by Wordpress, but this redirect is entirely powered by Apache. If users can do that, that’s absolutely a problem.

      And it absolutely is still there. I’ve clicked the links on a multitude of different browsers, and they continue to work. One comment lead me to discover that it only works if you are referred by google.com: https://shottr.cc/s/1CXn/SCR-20240426-cm4.png

      You’re the one who needs to get over yourself. A government website acting as referral spam for over a year is absolutely noteworthy

      • echelon 9 days ago
        And just because they chose spam, doesn't mean they couldn't serve malware instead. From a government website.
    • xandrius 9 days ago
      [flagged]
      • caymanjim 9 days ago
        Woke up on the wrong side of the bed.
  • rstat1 9 days ago
    [flagged]
    • internetter 9 days ago
      I published this post a few hours ago — still plenty of time :-)
    • cqqxo4zV46cp 9 days ago
      Huh? How does this have a partisan angle? This is the usual MO, like, anywhere.
      • observationist 9 days ago
        [flagged]
        • mattfields 9 days ago
          This seems to fall under the category of "inflammatory political commentary", regardless of including both parties in it.

          IMO seems borderline on flag-worthy.