Critical code_pattern
Resolved · benign:academic_tile_server
2026-04-28 09:24:15 (4d ago)
| Slug | osm |
|---|---|
| Pattern | hardcoded_ip_url |
| Kind | builtin |
| Version | 6.2.5 |
| Hit count | 2 |
| First hit |
|
| Explanation | plugin source hardcodes a raw IPv4 URL (e.g. `https://94.156.79.8/...`) — legitimate plugins use DNS hostnames because IPs change. Hardcoded IPs in plugin code are almost always either dev leftovers or attacker C2 infrastructure. The June 2024 social-warfare keylogger (audit #14) used `https://94.156.79.8/sc-top.js` for the JS payload host, `/AddSites` for victim registration, `/CMSUsers` for filesystem-recon exfil. Operator infrastructure on raw IPs avoids domain registration / RDAP detection paths. Post-filtered to skip RFC1918/loopback/link-local ranges and `vendor/`/`tests/` paths. |
View raw JSON
{
"slug": "osm",
"pattern": "hardcoded_ip_url",
"kind": "builtin",
"version": "6.2.5",
"hit_count": 2,
"first_hit": {
"file": "osm_map/osm-oljs2.php",
"line": 269,
"snippet": "$Layer .= 'var layerOSMHillshadeMap = new OpenLayers.Layer.TMS(\"OSMHillshadeMap\", \" http://129.206.74.245:8004/tms_hs.ashx?x={x}&y={y}&z={z} \",{ numZoomLevels: 18, type: \"png\", getURL: getTi"
},
"explanation": "plugin source hardcodes a raw IPv4 URL (e.g. `https://94.156.79.8/...`) \u2014 legitimate plugins use DNS hostnames because IPs change. Hardcoded IPs in plugin code are almost always either dev leftovers or attacker C2 infrastructure. The June 2024 social-warfare keylogger (audit #14) used `https://94.156.79.8/sc-top.js` for the JS payload host, `/AddSites` for victim registration, `/CMSUsers` for filesystem-recon exfil. Operator infrastructure on raw IPs avoids domain registration / RDAP detection paths. Post-filtered to skip RFC1918/loopback/link-local ranges and `vendor/`/`tests/` paths."
}