Hackers Revealed the Exploit Method Used to Hack 4chan Messageboard

“The hack was likely caused by 4chan using an extremely out-of-date version of PHP that has a lot of vulnerabilities and exploits and is using deprecated functions to interact with [their] MySQL database,” reported security researcher Yushe. The breach resulted in the complete extraction of 4chan’s PHP source code, including the main file “yotsuba.php” that manages posting and reporting functions. Following yesterday’s major security breach of the controversial imageboard 4chan, hackers have publicly revealed the sophisticated exploit method used to gain access to the site’s backend systems. The exploit leveraged a critical oversight in 4chan’s file validation system, allowing attackers to upload PostScript files containing malicious drawing commands disguised as legitimate PDFs. From this initial foothold, the attackers exploited what they described as “a mistaken suid binary” to elevate their privileges to that of the global user, effectively gaining complete control of the server. The attack, which took the platform offline for several hours, has exposed sensitive internal data including source code, moderator information, and administrative tools. In a post on their platform, they stated: “Today, April 14, 2025, a hacker, who has been in 4cuck’s system for over a year, executed the true operation soyclipse”. As proof of their control over the system, the hackers temporarily restored a previously banned board called “/qa/” and defaced it with the message “U GOT HACKED XD”. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Instead, they exploited a vulnerability in how 4chan processes uploaded files on certain boards including /g/, /pol/, /qst/, /sci/, and /lg/1. According to cybersecurity experts analyzing the hack, these PostScript files were then processed by Ghostscript, a software used by 4chan to generate thumbnail images. A group associated with rival imageboard Soyjak Party (colloquially known as “Sharty”) claimed responsibility for the attack. “They neglected to verify that the uploaded file is actually a PDF file,” stated the revelation post. Additionally, the email addresses and contact information of approximately 218 moderators, administrators, and “janitors” (lower-level moderators) were exposed.

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 16 Apr 2025 11:36:45 +0000


Cyber News related to Hackers Revealed the Exploit Method Used to Hack 4chan Messageboard

Infamous message board 4chan taken down following major hack - While those who claimed the attack didn't share how they gained access to 4chan's systems, some said the forum was likely breached because it used a severely outdated PHP version from 2016, unpatched against many security ...
3 weeks ago Bleepingcomputer.com
Hackers Revealed the Exploit Method Used to Hack 4chan Messageboard - “The hack was likely caused by 4chan using an extremely out-of-date version of PHP that has a lot of vulnerabilities and exploits and is using deprecated functions to interact with [their] MySQL database,” reported security researcher ...
3 weeks ago Cybersecuritynews.com
Motorious 4chan Forum Hacked and the Internal Data Leaked - Security expert Alon Gal, co-founder of cybercrime monitoring company Hudson Rock, stated that the hack “looks legit,” citing publicly circulating screenshots showing 4chan’s backend infrastructure. In a post on their platform, they ...
3 weeks ago Cybersecuritynews.com
How Hackers Interrupted GTA 5 Online Gameplay on PC - Recently, a cyber-attack on Grand Theft Auto 5 Online on PC caused an interruption to thousands of players’ gameplays. The game was completely taken offline and players couldn’t even access the main gameplay menu. The attack caused an uproar ...
2 years ago Hackread.com
The Unlikely Romance of Hackers and Government Suitors - The annual Hack the Capitol event brings together a diverse group of scientists, hackers, and policymakers to educate congressional staffers, scholars, and the press about the most critical cybersecurity challenges facing our nation. Hack the Capitol ...
1 year ago Darkreading.com
North Korean hackers linked to $1.5 billion ByBit crypto heist - Since the attack, crypto fraud investigator ZachXBT has discovered links between the Bybit hackers and the infamous North Korean Lazarus threat group after the attackers sent stolen Bybit funds to an Ethereum address previously ...
2 months ago Bleepingcomputer.com Lazarus Group
Hack The Box Launches 5th Annual University CTF Competition - PRESS RELEASE. Hack The Box, the leading gamified cybersecurity upskilling, certification, and talent assessment platform, is announcing its fifth annual global University Capture The Flag competition that will take place from December 8 to 10, 2023. ...
1 year ago Darkreading.com
Congressman Coming for Answers After No-Fly List Hack - U.S. Congressman Bennie Thompson is demanding answers from airlines and the federal government after a "massive hack" of the no-fly list. The congressman sent a letter to the airlines and the Department of Homeland Security asking for an explanation ...
2 years ago Therecord.media
FBI disrupts Moobot botnet used by Russian military hackers - The FBI took down a botnet of small office/home office routers used by Russia's Main Intelligence Directorate of the General Staff in spearphishing and credential theft attacks targeting the United States and its allies. This network of hundreds of ...
1 year ago Bleepingcomputer.com Fancy Bear APT28 Turla Volt Typhoon
Hacker Conversations: Chris Evans, Hacker and CISO - Chris Evans is CISO and chief hacking officer at HackerOne. SecurityWeek's Hacker Conversations series seeks to understand the mind and motivations of hackers by talking to hackers. Evans challenges the common perception of both hackers and their ...
10 months ago Securityweek.com Silence
Microsoft: BlueNoroff hackers plan new crypto-theft attacks - Microsoft warns that the BlueNoroff North Korean hacking group is setting up new attack infrastructure for upcoming social engineering campaigns on LinkedIn. This financially motivated threat group also has a documented history of cryptocurrency ...
1 year ago Bleepingcomputer.com
North Korea's state hackers stole $3 billion in crypto since 2017 - North Korean-backed state hackers have stolen an estimated $3 billion in a long string of hacks targeting the cryptocurrency industry over the last six years since January 2017. Kimsuky, Lazarus Group, Andariel, and other North Korean hacking groups ...
1 year ago Bleepingcomputer.com Andariel Kimsuky Lazarus Group
The Startup That Transformed the Hack-for-Hire Industry - If you're looking for a long read to while away your weekend, we've got you covered. First up, WIRED senior reporter Andy Greenberg reveals the wild story behind the three teenage hackers who created the Mirai botnet code that ultimately took down a ...
1 year ago Wired.com Scattered Spider
Ukraine security services involved in hack of Russia's largest private bank - Ukrainian hackers collaborated with the country's security services, the SBU, to breach Russia's largest private bank, a source within the department confirmed to Recorded Future News. Last week, two groups of pro-Ukrainian hackers, KibOrg and NLB, ...
1 year ago Therecord.media
Why Have Big Cybersecurity Hacks Surged in 2023? - Payments made to hackers who hold systems hostage for ransom increased by almost half through September, according to blockchain analytics firm Chainalysis Inc., totaling almost $500 million in payouts. In just the past few months, hackers have ...
1 year ago Bloomberg.com LockBit
Hackers breach Australian court hearing database - The court system for Australia's second-most-populated state was hit by a ransomware attack that potentially exposed sensitive recordings of some court hearings. Court Services Victoria, an administrative body that supports the operations of the ...
1 year ago Therecord.media Qilin
Cyber Security News Letter: Key Updates on Attacks, Vulnerabilities, & Data Breaches - Attackers are actively exploiting critical vulnerabilities in on-premises Microsoft Exchange and SharePoint servers, using advanced NTLM relay and credential theft techniques for persistent access. Researchers have detected a new JScript loader ...
3 weeks ago Cybersecuritynews.com CVE-2025-24054
CISA orders agencies impacted by Microsoft hack to mitigate risks - CISA has issued a new emergency directive ordering U.S. federal agencies to address risks resulting from the breach of multiple Microsoft corporate email accounts by the Russian APT29 hacking group. It requires them to investigate potentially ...
1 year ago Bleepingcomputer.com APT29
Booking.com hackers increase attacks on customers - Hackers are increasing their attacks on Booking.com customers by posting adverts on dark web forums asking for help finding victims. Cyber-criminals are offering up to $2,000 for login details of hotels as they continue to target the people who are ...
1 year ago Bbc.com
Holiday Hackers: How to Safeguard Your Service Desk - Hackers really don't take holidays, but they will take advantage of them. Many of these cyberattacks will zero in on the service or help desk to gain entry into network systems. Recovering accounts because of forgotten passwords is one of the ...
1 year ago Bleepingcomputer.com
Lapsus$: GTA 6 hacker handed indefinite hospital order - An 18-year-old hacker who leaked clips of a forthcoming Grand Theft Auto game has been sentenced to an indefinite hospital order. Arion Kurtaj from Oxford, who is autistic, was a key member of international gang Lapsus$. The gang's attacks on tech ...
1 year ago Packetstormsecurity.com LAPSUS$
Insomniac Game Studio Hacked, Wolverine Project Leaked In Breach - Insomniac, one of the most successful video game makers in the world, was recently the victim of a massive hack ... and parts of the highly anticipated Wolverine game were among the troves of material leaked in the breach. According to multiple ...
1 year ago Tmz.com Rhysida
HPE investigates new breach after data for sale on hacking forum - Hewlett Packard Enterprise is investigating a potential new breach after a threat actor put allegedly stolen data up for sale on a hacking forum, claiming it contains HPE credentials and other sensitive information. The company has told ...
1 year ago Bleepingcomputer.com APT1 APT29
North Korean Hackers Utilizing Credential Stuffing to Launch Cyberattacks - In an alarming new report, researchers found that North Korean-linked hackers have been using stolen passwords during cyberattacks to gain access to various government, military and financial networks. According to security experts, the creative ...
2 years ago Thehackernews.com
Sandworm Hackers Caused Another Blackout in Ukraine-During a Missile Strike - The notorious unit of Russia's GRU military intelligence agency known as Sandworm remains the only team of hackers to have ever triggered blackouts with their cyberattacks, turning off the lights for hundreds of thousands of Ukrainian civilians not ...
1 year ago Wired.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)