Security experts say the attackers, a group called GNAA known for trolling bloggers with racists posts and comments, exploited a weakness in Tumblr's reblogging function. "Anyone who was logged into Tumblr would automatically reblog the infectious post if they visited one of the offending pages," Graham Cluley, senior technology consultant at Sophos, explained in a blog post today.
Tumblr cleaned up the posts and patched the hole by 1:30 p.m. EST today that had allowed the worm to spread so quickly throughout the social network. "Tumblr engineers have resolved the issue of the viral post attack that affected a few thousand Tumblr blogs. Thanks for your patience," the social network said in its Twitter feed.
[UPDATE: Tumbler issued an updated statement on the worm: "This morning, some of you may have noticed a spam post appearing repeatedly on your Dashboard and on the blogs of a few thousand affected accounts. We quickly identified the source, removed the posts, and restored service to normal.
No accounts have been compromised, and you don’t need to take any further action.
Our sincere apologies for the inconvenience. As always, we are going to great lengths to make sure this type of abuse does not happen again."]
David Marcus, director of advanced research and threat intelligence for McAfee, says it's difficult to discern the specific vulnerability based on the slim amount of information that has been disclosed thus far, but the attack is akin to stealing a password and posting multiple times using the stolen credentials. "It's snarfing the creds and passing those credentials to the reblogging services and posting as you," Marcus says. "The danger is that reblogging allows it to be an order of magnitude larger" than a stolen password because reblogging is automated, he says.
A GNAA member told Gawker that the attack was a way to publicly shame Tumblr into fixing the vulnerability. "We contacted Tumblr about this weeks ago and nothing came of it," he said. "This was a serious issue that needed to be fixed ... They never got back to us."
The attack only worked on users who were logged in, and the good news was that the attackers defaced rather than doxed or performed other more nefarious acts, experts say.
"It's tidy," McAfee's Marcus says. "It also shows one of the dangers of staying logged in ... and having multiple panes" open in the browser, he says.
[Three-year-old 'dead' Windows worm infection is still spreading -- mainly via weak or stolen passwords, Microsoft says. See Microsoft: Conficker Worm Remains 'Ongoing' Threat.]
Marcus recommends that Tumbler users log out of Tumbler and close their browsers. "Kill the browser instance, spawn a new browser, and then log back into" Tumblr just to be sure there is no residual code in their system, he says.
Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.