Hello,
Our security team sent me an email regarding a (relatively) new malware that allows attackers to access the .env file in Laravel and they told us to make sure there are no passwords in the .env right now, but we do have passwords there.
This is the source from which he gave it to us: https://www.darkreading.com/cloud-security/cisa-aws-microsoft-365-accounts-androxgh0st-attack
If my server is not Apache, but it is Windows Server, does it mean I am not vulnerable? Because from quick read I saw it's only targeting Apache servers.
*Edit: I was wrong, the title says: "Apache webservers and websites using the popular Laravel Web application framework", so looks like either of them separately
Also it says in the article:
"If the .env file is exposed, threat actors will issue a GET request to the /.env URI to attempt to access the data on the page," the two agencies said.
But how come? Isn't the .env naturally never exposed? it's behind the root of the server's folder
Also, in case I will need to remove passwords from the .env file.. is there any workaround until it is patched?
Or, I should just do a completely different approach for that and not store plain text passwords in the .env?
Thanks