We’ve added new rules to our web application firewall to block hacking attempts relating to a remote code execution exploit found in the EM_Ajaxproducts and Ophirah_Qquoteadv plugins. We scanned all Hypernodes, if your shop had any of these two plugins installed you will have received an email with more specific information.

Other changes in this release:

  • Clamav is updated nightly instead of running continuously as the freshclam daemon (this could cause a CPU loop in low memory conditions)
  • Our emergency rescue automation is now also active for Amazon Hypernodes (restart services, hard reboot in case of apparent downtime)
  • Automated emergency rescue cooldown has been decreased from 12 hours to 1 hour per Hypernode