Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Krpano XSS exploitation campaign

Type
Campaign
Actors
❓Unknown
Pub. date
February 26, 2025
Initial access
1-day vulnerability
Impact
DefacementResource hijacking
Observed techniques
XML injectionSubdomain takeoverVulnerability exploitation
Targeted technologies
Krpano
References
https://olegzay.com/360xss/
Status
Finalized
Last edited
Mar 27, 2025 1:30 PM

The "360XSS" campaign is a widespread exploitation of a reflected cross-site scripting (XSS) vulnerability in the popular virtual tour framework Krpano, which allows external XML content to be injected via the xml query parameter. The vulnerability, known as CVE-2020-24901, stems from the misuse of Krpano’s passQueryParameters setting, which was enabled by default in many installations. Threat actors exploited this flaw across over 350 high-traffic websites—including Yale, CNN, and geo.tv—by injecting malicious XML containing Base64-encoded JavaScript that redirected visitors to pornographic, casino, and spammy advertisement pages. In some cases, the attackers went further by embedding fake content directly on the legitimate domains without redirection, enhancing the campaign’s credibility and reach.

Rather than stealing data or launching destructive attacks, the adversaries focused on SEO poisoning—using the reflected XSS links to manipulate Google’s search results and rank their spam ads highly under trusted domains. These links appeared in search results for high-volume keywords and included fake reviews, stars, and unique titles to optimize visibility. The attackers utilized hijacked subdomains and misconfigured cloud-hosted resources to deliver their payloads, pointing to a well-organized and possibly monetized operation.

Made with 💙 by Wiz

Last Updated: April 3, 2025