We are publishing the first case in the OJS Threat Intelligence (OJSTI) series — a full forensic analysis of a real server-side compromise in an OJS environment.
Master Report (OJSTI-CR-2026-01) Documents the complete compromise: malicious PHP components across active OJS paths, operational webshell activity, host-level persistence outside the webroot via .bashrc/.zshrc, and database contamination across 191 accounts.
Key techniques mapped to MITRE ATT&CK: T1505.003, T1059.006, T1105, T1036, T1136.
Analytic Series — 9 briefs, weekly release Each brief dissects a specific forensic layer of the same incident:
-
Brief 01: Forensic Scope, Methodology and Evidence Basis https://ojsone.com/en/resources/ojsti-case-report-2026-02-forensic-scope-analytic-methodology-and-evidence-basis
-
Brief 02: Initial Intrusion Indicators and Early Timeline (coming next week)
-
Brief 03: Malicious PHP Components in OJS Environments (coming)
-
Brief 04: Operational Use of Webshells in HTTP Logs (coming)
-
Briefs 05–09: (weekly release)
All findings are anonymized. The goal is to give OJS operators, hosting providers, and institutional security teams actionable intelligence grounded in real evidence — not theory.
If you operate OJS infrastructure and have encountered similar indicators, we welcome discussion.
— Oscar Sandoval, OJS One