• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Malware   »   Summary of Shellshock-Related Stories and Materials

Summary of Shellshock-Related Stories and Materials

  • Posted on:September 29, 2014 at 1:09 am
  • Posted in:Malware, Vulnerabilities
  • Author:
    Trend Micro
0

Our coverage on the Bash bug vulnerability (more popularly known as “Shellshock”) continues as we spot new developments on Shellshock-related threats and attacks.

Here is a list of our stories related to this threat:

  • Shellshock: A Technical Report – this technical brief describes the vulnerability in detail, as well as outlying which platforms are affected.
  • Shellshock-Related Attacks Continue, Targets SMTP Servers – vulnerable SMTP servers are being targeted by Shellshock exploit code to launch an IRC bot
  • Bash Bug Saga Continues: Shellshock Exploit via DHCP – we take an in-depth look at Shellshock exploits over the DHCP protocol.
  • Shellshock Vulnerability Downloads KAITEN Source Code – we are seeing attacks involving the download of source code as a method of evasion.
  • Shellshock Vulnerabilities Proliferate, Affect More Protocols – attacks using Shellshock are now targeting new web services, including mail and FTP servers.
  • Shellshock Exploit Attempts Continue in China – servers in China are also being targeted by Shellshock.
  • Shellshock Continues to Make Waves with Active IRC Bot – IRC bots are being spread via Shellshock, hitting approximately 400 systems.
  • Shellshock Updates: BASHLITE C&Cs Seen, Shellshock Exploit Attempts in Brazil – we analyze the location of C&C servers associated with a DDoS attack using this vulnerability.
  • Shellshock Vulnerability Used in Botnet Attacks – certain institutions are now being hit with DDoS attacks tied to botnets that spread via Shellshock.
  • Shellshock – How Bad Can It Get? – we analyze possible scenarios how Shellshock can be exploited.
  • Bash Vulnerability (Shellshock) Exploit Emerges in the Wild, Leads to BASHLITE Malware – within hours of disclosure, Shellshock exploits were in the wild.
  • Bash Vulnerability Leads to Shellshock: What it is, How it Affects You – initial disclosure of the vulnerability in Bash and a discussion of our solutions.
Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: bash bug vulnerabilityBash vulnerabilityBASHLITEExploitshellshockvulnerability

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits
  • August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild
  • Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.