They have not yet understood how apache binary is being replaced by a malicious version. It is not clear if the attack begins through apache itself or by cpanel or ssh. The article title emphasize apache as the guilty one, but the point is that this kind of attack goes undetected very easily and could be directed to other binaries too.
2013/4/29 Philip Kilner <[email protected]> > Hi Massimo, > > On 29/04/13 17:17, Massimo Di Pierro wrote: > >> http://apache.slashdot.org/**story/13/04/29/1258205/** >> sophisticated-apache-backdoor-**in-the-wild<http://apache.slashdot.org/story/13/04/29/1258205/sophisticated-apache-backdoor-in-the-wild> >> >> > To be fair, following the link, it seems to be more of a cPanel backdoor - > it doesn't seem that Apache alone is vulnerable, only via cPanel. > > > I have moved to Nginx already and I am happy. ;-) >> >> > I have opted for Virtualmin over cPanel, and I too am happy. ;-) > > > -- > > Regards, > > PhilK > > > e: [email protected] - m: 07775 796 747 > > 'work as if you lived in the early days of a better nation' > - alasdair gray > > > -- > > --- You received this message because you are subscribed to the Google > Groups "web2py-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to > web2py+unsubscribe@**googlegroups.com<web2py%[email protected]> > . > For more options, visit > https://groups.google.com/**groups/opt_out<https://groups.google.com/groups/opt_out> > . > > > -- --- You received this message because you are subscribed to the Google Groups "web2py-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/groups/opt_out.

