• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   bash bug

Patches Not Cure-all for Shellshock

  • Posted on:December 23, 2014 at 12:05 am
  • Posted in:Vulnerabilities
  • Author:
    Trend Micro
0

Earlier this year, Linux system administrators all over the world had to deal with the Shellshock vulnerability, which could lead to malicious code being run on Linux systems. Servers running various web services were at particular risk. By now, most major distributions have been able to release patches that upgraded the vulnerable bash shell to versions not affected…

Read More
Tags: bashbash bugIDSLinuxpatchingshellshockwhitelisting

Shellshock Vulnerability Downloads KAITEN Source Code

  • Posted on:October 5, 2014 at 11:55 am
  • Posted in:Exploits, Mac, Malware, Vulnerabilities
  • Author:
    Trend Micro
0

Since the discovery of Shellshock, Trend Micro has continuously monitored the threat landscape for any attacks that may leverage these vulnerabilities. So far, we have identified an active IRC bot, exploit attempts in Brazil and China, botnet attacks, and a wide variety of malware payloads such as ELF_BASHLITE.A, ELF_BASHLET.A, and PERL_SHELLBOT.WZ among others.  It is reported that…

Read More
Tags: bash bugExploitKAITENshellshockVulnerabilities

Shellshock Exploit Attempts Continue in China

  • Posted on:September 28, 2014 at 6:27 am
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Trend Micro
2

It seems like the floodgates have truly opened for Shellshock-related attacks. We have reported on different attacks leveraging the Bash bug vulnerability, ranging from botnet attacks to IRC bots. We have also mentioned that we spotted Shellshock exploit attempts in Brazil. It appears that these attempts were not limited to that country alone. We saw…

Read More
Tags: bashbash bugbash bug vulnerabilityExploitIRC botIRC channelIRC servershellshock

Shellshock – How Bad Can It Get?

  • Posted on:September 26, 2014 at 1:21 am
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Trend Micro
0

In the immediate aftermath of the Bash vulnerability known as Shellshock, we have already seen some attacks using it to deliver DDoS malware onto Linux systems. However, given the severity of this vulnerability, it is almost certain that we will see bigger, severer attacks. What are some of the scenarios we could potentially see? Servers Web servers are currently…

Read More
Tags: bash bugBash vulnerabilityBASHLITEExploitFLOODERLinuxshellshockShellshock attackvulnerability

Bash Vulnerability (Shellshock) Exploit Emerges in the Wild, Leads to BASHLITE Malware

  • Posted on:September 25, 2014 at 12:06 pm
  • Posted in:Exploits, Malware, Vulnerabilities
  • Author:
    Trend Micro
3

Just several hours after the news on the bash vulnerability (covered under CVE-2014-7169) broke out, it was reportedly being exploited in the wild already.  This vulnerability can allow execution of arbitrary code, thus compromising the security of systems. Some of the possible scenarios that attackers can do range from changing the contents of web server and…

Read More
Tags: bash bugBash vulnerabilityBASHLITECVE-2014-6271CVE-2014-7169ExploitFLOODERLinuxShellshock attackvulnerability
Page 1 of 212

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • Mac Backdoor Linked to Lazarus Targets Korean Users
  • New Magecart Attack Delivered Through Compromised Advertising Supply Chain
  • 49 Disguised Adware Apps With Optimized Evasion Features Found on Google Play
  • September Patch Tuesday Bears More Remote Desktop Vulnerability Fixes and Two Zero-Days
  • Microsoft November 2019 Patch Tuesday Reveals 74 Patches Before Major Windows Update

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.