# Muhstik Botnet Exploits Highly Critical Drupal Bug **[threatpost.com/muhstik-botnet-exploits-highly-critical-drupal-bug/131360/](https://threatpost.com/muhstik-botnet-exploits-highly-critical-drupal-bug/131360/)** ## Subscribe to our Threatpost Today newsletter Join thousands of people who receive the latest breaking cybersecurity news every day. The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the [privacy policy. In addition, you will find them in the message confirming the subscription to](https://threatpost.com/web-privacy-policy/) the newsletter. Twitter Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug. [https://t.co/pr5jq08fPx](https://t.co/pr5jq08fPx) ## Discussion This is only the beginning. Drupal users better PATCH in a hurry. ----- Drupal should just throw in the towel. Honestly my impression on their ability to keep their platform secure, is slim. At this point - they are worse than Worpress. Always something negative about Drupal in the news. ## Subscribe to our newsletter, Threatpost Today! Get the latest breaking news delivered daily to your inbox. Subscribe now -----