neomantra a day ago

I really appreciate that this supply breach was discovered by a diligent system operator (tracking a slow HTTP request).

Similarly, the xz breach was uncovered by a diligent developer looking at quirky SSH login performance regressions.

  • mlyle a day ago

    Malware used to be pretty obvious for performance penalties.

    But we are getting so much faster, and networks are doing so much weird inscrutable stuff now that it’s a lot harder at baseline. And, of course, the baddies are getting sneakier, too, and we are building systems from more components from more diverse sources.

    I worry about the long term picture a lot; does all of infrastructure become a little untrustworthy at baseline?

    • bee_rider a day ago

      Wasn’t that supposed to be the default assumption? The bad guys start just after your network interface.

      This was the argument against WiFi encryption in the old days (who cares about WiFi encryption, the network is assumed evil, so your messages should be encrypted rendering WiFi security moot). Which actually seemed pretty compelling to me. Nowadays, of course, someone will hop on your WiFi and download a bunch of movies without authorization, giving you copyright headaches. But that’s authentication…

      • alexchantavy a day ago

        Yeah that's what's called an assume breach/zero trust mindset. In a modern environment you can't rely on the network perimeter being a security boundary, so you need to minimize permissions (so that if an identity is hacked then the blast radius is reduced) and invest in detections and remediation plans.

      • mlyle a day ago

        Sure— but now everything has so many dependencies; dependencies are recursive, and the scope exceeds any reasonable audit. And at least getting lucky enough to spot malfeasance is getting less and less likely as performance and noise grows.

      • vasco 11 hours ago

        > will hop on your WiFi and download a bunch of movies without authorization, giving you copyright headaches

        It's funny how the copyright lobby as brainwashed us so much that the worse you can think of someone in your wifi can do is download movies. What about, you know, actual crime? Wire fraud, planning terrorist attacks etc from your network? But we think of downloading movies.

    • SV_BubbleTime a day ago

      > I worry about the long term picture a lot; does all of infrastructure become a little untrustworthy at baseline?

      Isn’t that a scenario that is better?

      If you stop trusting potentially insecure systems you start developing hard and solid ones.

      I don’t worry about deepfakes or AI malware, I welcome it. It’s stupid that we have insecure systems like unencrypted emails, social security cards, unsigned documents, passwords in PIN codes alone, etc.

      • mlyle a day ago

        I think what I am describing is worse. I have a harder and harder time as software and the resultant supply chain surface grows. And my chance to filter, monitor, validate, and audit software gets correspondingly worse as systems do more and more.

        More components; recursive dependencies; more remote infrastructure; these are the directions the world is going, and the stuff we need to manage this complexity is not keeping up.

        • marcosdumay a day ago

          Hum... If you try to fight the stuff on your first paragraph with more of anything, you'll lose every single time.

          You can only fight it with fewer components, fewer recursive dependencies, and less remote infrastructure.

          • mlyle a day ago

            Sure. Plenty of my stuff “lives” similarly to the mid-90s. But that is not the way of the world and is increasingly giving up a lot.

        • SV_BubbleTime 21 hours ago

          I struggle with what I consider a complexity crisis.

          While at the same time, I believe the purpose of all things is to increase their entropy.

          So… I think that is the next filter or natural selection for us. That we make this so complex we crash, or we get better.

anthonyeden a day ago

The official Gravity Forms post [0] indicates you were only compromised if you installed Gravity Forms via direct website download or Composer install.

From what I can see, Composer install methods use the same Gravity Forms API to fetch the install package as the auto-update feature within the plugin. Their WP-CLI plugin uses the same mechanism too.

It will be interesting to see if the Gravity Forms developers engage a third party security firm to investigate this incident. So far they have not mentioned it.

[0] https://www.gravityforms.com/blog/security-incident-notice/

rectang a day ago

> We also received a confirmation from one of the staff of RocketGenius that the malware only affects manual downloads and composer installation of the plugin.

Phew.

mpol 2 days ago

Using a nonce before checking the form would have prevented much of the problems described. Or stated differently, it would suddenly require lots of manual labour.

  • jimjambw a day ago

    I’m from a technical background and so I understand this but being a Brit sentences like this are always funny to me

    • astura a day ago

      For those who didn't understand this comment (like me)

      Nonce is also British slang for alleged or convicted sex offenders, especially ones involving children.

      • MarkusQ a day ago

        That's why you should call them pervs (per-instance values).

        • darknavi a day ago

          Why not pedos (pedantic objects)?

      • 4ndrewl a day ago

        Makes some discussions with non-technical stakeholders interesting.

        • mijoharas a day ago

          I always just call them "n-once" and I read it that way too (which I think is what it comes from right? Number you use once?).

          At least that way it stops me from making childish jokes.

      • projektfu a day ago

        > put nonces on form > all spam, normal traffic gone > received e-mail complaint from sex offender registry because i am downloading too many images

    • theglenn88_ a day ago

      Not On Normal Courtyard Exercise

      • stuartjohnson12 a day ago

        Basically A Creative Kind of Reverse Origin Naming You Make

doodlebugging a day ago

Nice work to identify this malware and take action against it spreading. The article does have one small error though that made me do a double-take.

The most recent update at the top of the page should probably be "Update 7-12-2025 06:00 UTC" instead of the current future date of 08-11-2025. I think the author incremented the wrong digit.

  • blueflow a day ago

    Of course the author got confused about which number means which. This is what you deserve when you use US dates but try to make them look like ISO by using dashes, but still fuck up the ordering and padding.

bhk a day ago

What does this impact? 90% of sites on the internet? Just a couple of low-traffic sites?

  • rectang a day ago

    Somewhere in between.

    Gravity Forms is a very popular premium WordPress plugin.

    I maintain a handful of WordPress sites (wouldn't have been my choice of platform but whatever) and the design and functionality of Gravity Forms is better than most (aside from it being CPU-hungry). It doesn't generally give me trouble and as a developer I've been happy with how Rocket Genius have interacted with me when I've filed trouble tickets.

    A pretty substantial number of small and mid-tier orgs have Gravity Forms installed. I don't know the numbers — the wordpress.org popularity stats mainly reflect installation of free plugins not premium — but there should be a lot of sites handling a lot of traffic.

    EDIT: That's the number of sites which could have been affected. Fortunately only a small number of sites actually got the compromised package because it didn't enter the main automatic distribution chain.

    • dotancohen 9 hours ago

      I haven't done Wordpress since before 5.0 (Gutenberg), but even then (2017) Gravity Forms was used on almost every site.

  • chuckreynolds a day ago

    seemingly small amount of sites that manually downloaded that version from the site as opposed to 'most' that get premium(paid) update files through their API gateway (that I think calls file from AWS).

    > The Gravity API service that handles licensing, automatic updates, and the installation of add-ons initiated from within the Gravity Forms plugin was never compromised. All package updates managed through that service are unaffected.

  • Dazzler5648 6 hours ago

    "The infection does not seem to be widespread, which could mean that the backdoored plugin was only available for a very short period of time and only delivered to a small number of users."

mmsc a day ago

Popped by AB of Ac1dB1tch3z

giingyui 2 days ago

Should say what plugin it is.

  • Etheryte 2 days ago

    It's in the title? It's the official GravityForms plugin, supposedly version 2.9.13 fixes the issue, but the changelog [0] doesn't even mention the breach.

    [0] https://docs.gravityforms.com/gravityforms-change-log/

    • giingyui 2 days ago

      The way it’s worded in the article it sounds like there are multiple plugins available in that domain.

      > one of the plugins that they are trying to download from the official gravityforms.com domain

      It’s common for certain plugins to have… plugins of their own. For example if you have a form created with gravityforms and you want to connect it to a CRM or something, there is a screen inside the plugin settings to install it. Which is why I asked. (I don’t know if that’s the case with gravityforms.)

    • redrove a day ago

      Honestly it still required a web search on my part to figure out it’s a WordPress plugin. That should be in the title.

      • autoexec a day ago

        Any time I read the words vulnerable and plugin I just assume WordPress is involved somehow. I'm convinced that the internet would be instantly more secure if the entire platform died off.

        • ChrisMarshallNY a day ago

          It would.

          It also would be a lot less useful. A lot of content is published through WordPress.

          I suspect an effective approach would be encouraging ways to make WP more secure, or publish a secure platform that can easily be transitioned from WP.

        • d0mine a day ago

          Wordpress dominates internet outside megacorps. There are a lot of security issues but there is a lot of utility too.

      • swang a day ago

        you're not suppose to editorialize or change the title per HN rules.

iambateman a day ago

How is this even possible? Is the most likely explanation that a bad actor within GravityForms snuck something in?

I didn’t see anything in the article but I may have missed it.

  • Y-bar a day ago

    Could have been a compromised CI pipeline like Jenkins or a developer machine with a malware infection.

  • Hilift a day ago

    Do you allow permissive outgoing Internet traffic from your servers? To domains recently created? This malware is for you.

kristianc 20 hours ago

Am I alone in thinking it's kind of nuts that there's a $259 extension for Web Forms in the first place. Is this WordPress being horribly broken, the WordPress ecosystem being a playground for grifters, naive non-technical WordPress users or all three?

  • Y-bar 12 hours ago

    Why do you think so? $259 is less than a day’s worth of freelance invoice by the hour.

    Web forms and especially the business logic powering them in the backend can quickly become very complex. Just check out some templates you get out of the box https://www.gravityforms.com/form-templates/

    I don’t use Wordpress, but this seems like an actively developed, supported, quality plug-in.

    This entitled assumption that nothing should cost money up front is hurting everyone in they long run because it drives developers into monetising using ads and invasive tracking.

  • stebian_dable 12 hours ago

    It’s GPLv2+ so you can grab a copy from a friend legally for free and vibe code around the possible copy protections.

  • sen 19 hours ago

    Definitely all 3.

  • pacifika 16 hours ago

    WordPress usecases are wider than most people expect.

  • bombcar 9 hours ago

    $259 is dirt cheap for a tool that does what you want:need.

    For many people with Wordpress sites they’re going to spend way more than that having someone setup the forms for them.