<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Shellshock Bash Vulnerability</title>
	<atom:link href="http://www.epanorama.net/blog/2014/09/25/shellshock-bash-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/09/25/shellshock-bash-vulnerability/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 09 Apr 2026 15:47:07 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Williamgex</title>
		<link>https://www.epanorama.net/blog/2014/09/25/shellshock-bash-vulnerability/comment-page-2/#comment-1869505</link>
		<dc:creator><![CDATA[Williamgex]]></dc:creator>
		<pubDate>Tue, 27 Jan 2026 18:46:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27586#comment-1869505</guid>
		<description><![CDATA[Over the past few years, global communication has grown at an unprecedented pace. Users across the globe now communicate daily in professional, personal, and cultural contexts. However, linguistic differences continue to pose a major obstacle. 
 
Conventional translation solutions like text-based translation software often require manual input. For this reason, many users are showing strong interest in AI-powered translation earbuds as a more efficient solution. 
 
These intelligent translation devices utilize advanced algorithms and neural networks to provide near real-time multilingual communication. By simply wearing the earbuds, conversations can flow smoothly while the system translates spoken language in real time. 
 
A key benefit of AI translation earbuds is their convenience. In contrast to traditional translators, they enable natural body language, improving overall interaction quality. This advantage is especially valuable during face-to-face conversations, negotiations, or casual chats. 
 
An additional advantage of AI translation earbuds is multilingual compatibility. Many devices support dozens of languages and accents, which makes them ideal in diverse linguistic settings worldwide. Some systems also include regional accent recognition, reducing misunderstanding. 
 
Precision also plays a crucial role. Today’s AI-powered devices use continuously improving AI models to better capture the meaning of conversations. In contrast to basic translators, they learn from data and usage, leading to higher accuracy. 
 
AI translation earbuds are also widely used in professional environments. Global conferences frequently include multilingual teams. With AI translation earbuds, meetings run more smoothly. Such innovation helps reduce misunderstandings. 
 
Travelers also benefit greatly on AI translation earbuds. In restaurants, shops, and public places, misunderstandings are common. By wearing translation earbuds, people can communicate more comfortably abroad. Ultimately, this provides improved confidence while traveling. 
 
A growing application for this technology is language learning. Learners can listen to real-time translations, enhancing language comprehension. With continued use, users may develop better pronunciation. 
 
Wearability and discretion are key factors. Modern AI translation earbuds focus on comfort and usability. Many models include noise-canceling features, supporting clear communication. Additionally, communication remains discreet, making them suitable for professional use. 
 
With ongoing improvements in AI, AI translation earbuds are likely to gain wider adoption. Next-generation features are expected to enhance usability and performance. These advancements will further reduce language barriers. 
 
In conclusion, smart translation earbuds offer a practical solution in global interaction. Through hands-free multilingual support, these devices enable smoother and more natural conversations. With increasing global demand, such devices will shape the future of communication in global society. 
 
https://swaay.com/u/francisng/about/]]></description>
		<content:encoded><![CDATA[<p>Over the past few years, global communication has grown at an unprecedented pace. Users across the globe now communicate daily in professional, personal, and cultural contexts. However, linguistic differences continue to pose a major obstacle. </p>
<p>Conventional translation solutions like text-based translation software often require manual input. For this reason, many users are showing strong interest in AI-powered translation earbuds as a more efficient solution. </p>
<p>These intelligent translation devices utilize advanced algorithms and neural networks to provide near real-time multilingual communication. By simply wearing the earbuds, conversations can flow smoothly while the system translates spoken language in real time. </p>
<p>A key benefit of AI translation earbuds is their convenience. In contrast to traditional translators, they enable natural body language, improving overall interaction quality. This advantage is especially valuable during face-to-face conversations, negotiations, or casual chats. </p>
<p>An additional advantage of AI translation earbuds is multilingual compatibility. Many devices support dozens of languages and accents, which makes them ideal in diverse linguistic settings worldwide. Some systems also include regional accent recognition, reducing misunderstanding. </p>
<p>Precision also plays a crucial role. Today’s AI-powered devices use continuously improving AI models to better capture the meaning of conversations. In contrast to basic translators, they learn from data and usage, leading to higher accuracy. </p>
<p>AI translation earbuds are also widely used in professional environments. Global conferences frequently include multilingual teams. With AI translation earbuds, meetings run more smoothly. Such innovation helps reduce misunderstandings. </p>
<p>Travelers also benefit greatly on AI translation earbuds. In restaurants, shops, and public places, misunderstandings are common. By wearing translation earbuds, people can communicate more comfortably abroad. Ultimately, this provides improved confidence while traveling. </p>
<p>A growing application for this technology is language learning. Learners can listen to real-time translations, enhancing language comprehension. With continued use, users may develop better pronunciation. </p>
<p>Wearability and discretion are key factors. Modern AI translation earbuds focus on comfort and usability. Many models include noise-canceling features, supporting clear communication. Additionally, communication remains discreet, making them suitable for professional use. </p>
<p>With ongoing improvements in AI, AI translation earbuds are likely to gain wider adoption. Next-generation features are expected to enhance usability and performance. These advancements will further reduce language barriers. </p>
<p>In conclusion, smart translation earbuds offer a practical solution in global interaction. Through hands-free multilingual support, these devices enable smoother and more natural conversations. With increasing global demand, such devices will shape the future of communication in global society. </p>
<p><a href="https://swaay.com/u/francisng/about/" rel="nofollow">https://swaay.com/u/francisng/about/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/25/shellshock-bash-vulnerability/comment-page-2/#comment-1539911</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 07 Mar 2017 12:51:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27586#comment-1539911</guid>
		<description><![CDATA[Shellshock Attacks Still Cheap and Easy: IBM
http://www.securityweek.com/shellshock-attacks-still-cheap-and-easy-ibm

Two and a half years after being discovered, the Shellshock vulnerability continues to be abused in attacks, and for a good reason: it is a very cheap and easy attack, IBM says.

Discovered in September 2014, Shellshock is a vulnerability found within the bourne-again shell (BASH), the default command shell in almost each and every Linux and Unix system at the time. An attacker able to abuse the security flaw could execute commands with super-user privileges remotely.

Tracked as CVE-2014-6271, the issue was found to affect a great deal of devices, including Web servers and Internet-of-Things (IoT) devices such as DVRs, printers, automotive entertainment systems, routers and even manufacturing systems. Mac OS X systems were also impacted.

With many applications relying on BASH, an attacker could exploit the vulnerability by sending a command sequence to the web server to be interpreted with the BASH. 

In July 2015, researchers warned that Shellshock was still being abused, and the attacks continue nearly two years later. Many vulnerable devices haven’t been patched to this day, and attackers are enticed to continue hitting those targets.

“Attackers need only a server, basic programming skills and access to malware to carry out this type of attack. The level of knowledge and effort required is quite low. Fraudsters can simply launch attacks against hundreds of different IP addresses per minute and wait to hit a vulnerable server by chance,” IBM’s Joerg Stephan explains.

To carry out a Shellshock attack, an attacker only needs to spend around $5 a month, Stephan says. For just over $30, an attacker could target around 1 million servers within a six-month period, which could translate into 100,000 victims, as roughly 10% of all servers remain unpatched, IBM says.

To show just how simple it would be to come up with the necessary code, IBM’s researcher published some basic Python code that can do the trick.

A bash script would download a bot from the server, save it to a certain path, make the file executable and run it, and could also include a line to execute the bot after each reboot, for persistence.]]></description>
		<content:encoded><![CDATA[<p>Shellshock Attacks Still Cheap and Easy: IBM<br />
<a href="http://www.securityweek.com/shellshock-attacks-still-cheap-and-easy-ibm" rel="nofollow">http://www.securityweek.com/shellshock-attacks-still-cheap-and-easy-ibm</a></p>
<p>Two and a half years after being discovered, the Shellshock vulnerability continues to be abused in attacks, and for a good reason: it is a very cheap and easy attack, IBM says.</p>
<p>Discovered in September 2014, Shellshock is a vulnerability found within the bourne-again shell (BASH), the default command shell in almost each and every Linux and Unix system at the time. An attacker able to abuse the security flaw could execute commands with super-user privileges remotely.</p>
<p>Tracked as CVE-2014-6271, the issue was found to affect a great deal of devices, including Web servers and Internet-of-Things (IoT) devices such as DVRs, printers, automotive entertainment systems, routers and even manufacturing systems. Mac OS X systems were also impacted.</p>
<p>With many applications relying on BASH, an attacker could exploit the vulnerability by sending a command sequence to the web server to be interpreted with the BASH. </p>
<p>In July 2015, researchers warned that Shellshock was still being abused, and the attacks continue nearly two years later. Many vulnerable devices haven’t been patched to this day, and attackers are enticed to continue hitting those targets.</p>
<p>“Attackers need only a server, basic programming skills and access to malware to carry out this type of attack. The level of knowledge and effort required is quite low. Fraudsters can simply launch attacks against hundreds of different IP addresses per minute and wait to hit a vulnerable server by chance,” IBM’s Joerg Stephan explains.</p>
<p>To carry out a Shellshock attack, an attacker only needs to spend around $5 a month, Stephan says. For just over $30, an attacker could target around 1 million servers within a six-month period, which could translate into 100,000 victims, as roughly 10% of all servers remain unpatched, IBM says.</p>
<p>To show just how simple it would be to come up with the necessary code, IBM’s researcher published some basic Python code that can do the trick.</p>
<p>A bash script would download a bot from the server, save it to a certain path, make the file executable and run it, and could also include a line to execute the bot after each reboot, for persistence.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/25/shellshock-bash-vulnerability/comment-page-2/#comment-1317029</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 17 Dec 2014 22:24:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27586#comment-1317029</guid>
		<description><![CDATA[Shellshock Exploits Targeting SMTP Servers at Webhosts 

The persistence of the Shellshock vulnerability remains high more than a month after it first surfaced.

The latest attacks involved SMTP servers belonging to web hosts, said a report published by the SANS Internet Storm Center.

“The attack leverages Shellshock as a main attack vector through the subject, body, to, from fields,” BDS said on its website. “Once compromised, a perl botnet is activated and beaconing on IRC for further instructions.”

The SANS alert said the perl bot contains simple DDoS commands, and can also receive and execute additional malware.

“It’s unknown which product would specifically be vulnerable to this since Shellshock relies on system level calls and leveraging bash however it seems to be a fairly wide-scale delivery of emails across the United States,” BDS added.
- See more at: http://threatpost.com/shellshock-exploits-targeting-smtp-servers-at-webhosts/109034#sthash.LbhvONhW.dpuf]]></description>
		<content:encoded><![CDATA[<p>Shellshock Exploits Targeting SMTP Servers at Webhosts </p>
<p>The persistence of the Shellshock vulnerability remains high more than a month after it first surfaced.</p>
<p>The latest attacks involved SMTP servers belonging to web hosts, said a report published by the SANS Internet Storm Center.</p>
<p>“The attack leverages Shellshock as a main attack vector through the subject, body, to, from fields,” BDS said on its website. “Once compromised, a perl botnet is activated and beaconing on IRC for further instructions.”</p>
<p>The SANS alert said the perl bot contains simple DDoS commands, and can also receive and execute additional malware.</p>
<p>“It’s unknown which product would specifically be vulnerable to this since Shellshock relies on system level calls and leveraging bash however it seems to be a fairly wide-scale delivery of emails across the United States,” BDS added.<br />
- See more at: <a href="http://threatpost.com/shellshock-exploits-targeting-smtp-servers-at-webhosts/109034#sthash.LbhvONhW.dpuf" rel="nofollow">http://threatpost.com/shellshock-exploits-targeting-smtp-servers-at-webhosts/109034#sthash.LbhvONhW.dpuf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/25/shellshock-bash-vulnerability/comment-page-2/#comment-1292768</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 17 Nov 2014 10:23:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27586#comment-1292768</guid>
		<description><![CDATA[Is DD-WRT Vulnerable to the Shellshock Bash Bug?
http://www.stevejenkins.com/blog/2014/09/is-dd-wrt-vulnerable-to-the-shellshock-bash-bug/

By default, the shell used by DD-WRT is displayed when you ssh into your router:
BusyBox v1.21.0 (2014-06-07 21:56:38 CEST) built-in shell (ash)
1
	
BusyBox v1.21.0 (2014-06-07 21:56:38 CEST) built-in shell (ash)

The built-in BusyBox “ash” shell is different than Bash, and I’ve run the exploit tests from my Fedora Shellshock article against ash in DD-WRT and got the following results

So the good news is that the default ash shell in DD-WRT is not affected by the Shellshock bug.

Now the bad news…

If you’ve installed OptWare on your DD-WRT router (if you don’t know what OptWare is… relax, because that means you haven’t installed it), Bash was installed on your DD-WRT router with OptWare. And the Bash shell installed with OptWare is vulnerable to the Shellshock bug, as users on the DD-WRT forums are reporting after running the exploit tests.

&quot;The only way the shellshock bug could be exploited is, that a user installs an app, e.g. apache that uses cgi to call bash and is available from wan.&quot;]]></description>
		<content:encoded><![CDATA[<p>Is DD-WRT Vulnerable to the Shellshock Bash Bug?<br />
<a href="http://www.stevejenkins.com/blog/2014/09/is-dd-wrt-vulnerable-to-the-shellshock-bash-bug/" rel="nofollow">http://www.stevejenkins.com/blog/2014/09/is-dd-wrt-vulnerable-to-the-shellshock-bash-bug/</a></p>
<p>By default, the shell used by DD-WRT is displayed when you ssh into your router:<br />
BusyBox v1.21.0 (2014-06-07 21:56:38 CEST) built-in shell (ash)<br />
1</p>
<p>BusyBox v1.21.0 (2014-06-07 21:56:38 CEST) built-in shell (ash)</p>
<p>The built-in BusyBox “ash” shell is different than Bash, and I’ve run the exploit tests from my Fedora Shellshock article against ash in DD-WRT and got the following results</p>
<p>So the good news is that the default ash shell in DD-WRT is not affected by the Shellshock bug.</p>
<p>Now the bad news…</p>
<p>If you’ve installed OptWare on your DD-WRT router (if you don’t know what OptWare is… relax, because that means you haven’t installed it), Bash was installed on your DD-WRT router with OptWare. And the Bash shell installed with OptWare is vulnerable to the Shellshock bug, as users on the DD-WRT forums are reporting after running the exploit tests.</p>
<p>&#8220;The only way the shellshock bug could be exploited is, that a user installs an app, e.g. apache that uses cgi to call bash and is available from wan.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/25/shellshock-bash-vulnerability/comment-page-2/#comment-1292763</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 17 Nov 2014 10:20:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27586#comment-1292763</guid>
		<description><![CDATA[BASHLITE Malware Uses ShellShock to Hijack Devices Running BusyBox
http://www.securityweek.com/bashlite-malware-uses-shellshock-hijack-devices-running-busybox

A new version of the BASHLITE malware is designed to scan compromised networks for devices that use BusyBox and attempts to gain control of them by leveraging the recently disclosed GNU Bash vulnerability referred to as ShellShock.

ELF_BASHLITE.A checked to see if infected devices were running BusyBox, a set of programs needed to run a Linux system. BusyBox is designed for embedded operating systems such as the ones running on routers.

A newer version of BASHLITE spotted by Trend Micro researchers (ELF_BASHLITE.SMB) is designed not only to identify systems running BusyBox, but to also hijack them.

The malware first scans the network for BusyBox devices and attempts to access them by using a predefined list of usernames and passwords. The list of passwords includes &quot;root,&quot; &quot;admin,&quot; &quot;12345,&quot; &quot;pass,&quot; &quot;password&quot; and &quot;123456.&quot;

&quot;Once a connection is established, it runs the command to download and run bin.sh and bin2.sh scripts, gaining control over the Busybox system,&quot;

Trend Micro advises administrators to make sure they change the default credentials on their network devices and disable remote shell if possible.

Earlier this week, the cross-browser testing service BrowserStack revealed that cybercriminals breached an unpatched server using ShellShock and ultimately gained access to customer information.]]></description>
		<content:encoded><![CDATA[<p>BASHLITE Malware Uses ShellShock to Hijack Devices Running BusyBox<br />
<a href="http://www.securityweek.com/bashlite-malware-uses-shellshock-hijack-devices-running-busybox" rel="nofollow">http://www.securityweek.com/bashlite-malware-uses-shellshock-hijack-devices-running-busybox</a></p>
<p>A new version of the BASHLITE malware is designed to scan compromised networks for devices that use BusyBox and attempts to gain control of them by leveraging the recently disclosed GNU Bash vulnerability referred to as ShellShock.</p>
<p>ELF_BASHLITE.A checked to see if infected devices were running BusyBox, a set of programs needed to run a Linux system. BusyBox is designed for embedded operating systems such as the ones running on routers.</p>
<p>A newer version of BASHLITE spotted by Trend Micro researchers (ELF_BASHLITE.SMB) is designed not only to identify systems running BusyBox, but to also hijack them.</p>
<p>The malware first scans the network for BusyBox devices and attempts to access them by using a predefined list of usernames and passwords. The list of passwords includes &#8220;root,&#8221; &#8220;admin,&#8221; &#8220;12345,&#8221; &#8220;pass,&#8221; &#8220;password&#8221; and &#8220;123456.&#8221;</p>
<p>&#8220;Once a connection is established, it runs the command to download and run bin.sh and bin2.sh scripts, gaining control over the Busybox system,&#8221;</p>
<p>Trend Micro advises administrators to make sure they change the default credentials on their network devices and disable remote shell if possible.</p>
<p>Earlier this week, the cross-browser testing service BrowserStack revealed that cybercriminals breached an unpatched server using ShellShock and ultimately gained access to customer information.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/25/shellshock-bash-vulnerability/comment-page-2/#comment-1292761</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 17 Nov 2014 10:19:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27586#comment-1292761</guid>
		<description><![CDATA[VXers Shellshocking embedded BusyBox boxen
It&#039;s 2014 and some people are still using default user names and passwords
http://www.theregister.co.uk/2014/11/17/vxers_get_busy_shellshocking_busybox_boxen/

Malware writers have crafted new wares to attack embedded devices running BusyBox and not yet patched against the ShellShock vulnerability, researcher Rhena Inocencio says.

Miscreants&#039; tool of choice for such attacks is malware called &quot;Bashlite&quot; that, once executed on a victim machine, probes for devices such as routers and Android phones running BusyBox to brute force logins through a preset list of usernames and passwords.

Trend Micro&#039;s Inocencio said the variant would download and run bin.sh and bin2.sh scripts to gain control over Busybox systems once a connection was established.

&quot;Remote attackers can possibly maximise their control on affected devices by deploying other components or malicious software into the system depending on their motive,&quot; Inocencio said.

&quot;As such, a remote attacker can issue commands or download other files on the devices thus compromising its security.&quot;

Attackers attempted to log in using user names &#039;root&#039;, &#039;admin&#039; and &#039;support&#039; and common and default passwords &#039;toor&#039;, &#039;password&#039;, &#039;123456&#039; and so on.]]></description>
		<content:encoded><![CDATA[<p>VXers Shellshocking embedded BusyBox boxen<br />
It&#8217;s 2014 and some people are still using default user names and passwords<br />
<a href="http://www.theregister.co.uk/2014/11/17/vxers_get_busy_shellshocking_busybox_boxen/" rel="nofollow">http://www.theregister.co.uk/2014/11/17/vxers_get_busy_shellshocking_busybox_boxen/</a></p>
<p>Malware writers have crafted new wares to attack embedded devices running BusyBox and not yet patched against the ShellShock vulnerability, researcher Rhena Inocencio says.</p>
<p>Miscreants&#8217; tool of choice for such attacks is malware called &#8220;Bashlite&#8221; that, once executed on a victim machine, probes for devices such as routers and Android phones running BusyBox to brute force logins through a preset list of usernames and passwords.</p>
<p>Trend Micro&#8217;s Inocencio said the variant would download and run bin.sh and bin2.sh scripts to gain control over Busybox systems once a connection was established.</p>
<p>&#8220;Remote attackers can possibly maximise their control on affected devices by deploying other components or malicious software into the system depending on their motive,&#8221; Inocencio said.</p>
<p>&#8220;As such, a remote attacker can issue commands or download other files on the devices thus compromising its security.&#8221;</p>
<p>Attackers attempted to log in using user names &#8216;root&#8217;, &#8216;admin&#8217; and &#8216;support&#8217; and common and default passwords &#8216;toor&#8217;, &#8216;password&#8217;, &#8217;123456&#8242; and so on.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/25/shellshock-bash-vulnerability/comment-page-2/#comment-1272986</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 28 Oct 2014 12:02:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27586#comment-1272986</guid>
		<description><![CDATA[Report: Criminals use Shellshock against mail servers to build botnet
Oct 27, 2014
http://www.csoonline.com/article/2839054/vulnerabilities/report-criminals-use-shellshock-against-mail-servers-to-build-botnet.html

However unlikely, their stab in the dark approach is working

Targeting message transfer agents (MTAs), and mail delivery agents (MDAs), criminals are using Shellshock as a means to create botnets. The process is slow, but working, thanks to unpatched installations of Bash or certain implementations of it. 

 &quot;We suspect bad actors may be conducting an initial dry run, in preparation for a real, potentially larger-scale attack. We believe it’s only a matter of time before attackers exploit the vulnerability to redirect users to malicious hosts, which can result in further compromise,&quot; FireEye wrote at the time.

How right they were. Among the findings from FireEye was a proof-of-concept script that created an IRC-based (Internet Relay Chat) botnet, capable of sending spam, initiating a DDoS attack, or performing remote command execution on the compromised host. 

On Friday, CSO became aware of a Shellshock-based campaign targeting organizations in Europe and the United States. It spreads via email, using Shellshock exploitation code in the message header fields. If successful, it delivers a simple Perl script as the payload, which adds the host to a botnet commanded form IRC. 

The Shellshock campaign targets mail servers, searching for vulnerable MTAs / MDAs. The messages themselves are blank, but the code needed to exploit the Shellshock vulnerability is placed into the message&#039;s headers. 

The script that powers the botnet behind this recent campaign is called Legend, and it has existed for several years now. The Legend script is simplistic, but effective once installed on a system.

Once installed, Legend will connect the compromised host to a pre-configured IRC server, where the attacker can issue commands individually or as a group. 

The following MTAs / MDAs are directly impacted by Shellshock in some cases, depending on their configuration. 

Courier Mail Server 
Exim 
QMail 
Postfix / Procmail 

There is at least one Shellshock exploit for Postfix circulating online]]></description>
		<content:encoded><![CDATA[<p>Report: Criminals use Shellshock against mail servers to build botnet<br />
Oct 27, 2014<br />
<a href="http://www.csoonline.com/article/2839054/vulnerabilities/report-criminals-use-shellshock-against-mail-servers-to-build-botnet.html" rel="nofollow">http://www.csoonline.com/article/2839054/vulnerabilities/report-criminals-use-shellshock-against-mail-servers-to-build-botnet.html</a></p>
<p>However unlikely, their stab in the dark approach is working</p>
<p>Targeting message transfer agents (MTAs), and mail delivery agents (MDAs), criminals are using Shellshock as a means to create botnets. The process is slow, but working, thanks to unpatched installations of Bash or certain implementations of it. </p>
<p> &#8220;We suspect bad actors may be conducting an initial dry run, in preparation for a real, potentially larger-scale attack. We believe it’s only a matter of time before attackers exploit the vulnerability to redirect users to malicious hosts, which can result in further compromise,&#8221; FireEye wrote at the time.</p>
<p>How right they were. Among the findings from FireEye was a proof-of-concept script that created an IRC-based (Internet Relay Chat) botnet, capable of sending spam, initiating a DDoS attack, or performing remote command execution on the compromised host. </p>
<p>On Friday, CSO became aware of a Shellshock-based campaign targeting organizations in Europe and the United States. It spreads via email, using Shellshock exploitation code in the message header fields. If successful, it delivers a simple Perl script as the payload, which adds the host to a botnet commanded form IRC. </p>
<p>The Shellshock campaign targets mail servers, searching for vulnerable MTAs / MDAs. The messages themselves are blank, but the code needed to exploit the Shellshock vulnerability is placed into the message&#8217;s headers. </p>
<p>The script that powers the botnet behind this recent campaign is called Legend, and it has existed for several years now. The Legend script is simplistic, but effective once installed on a system.</p>
<p>Once installed, Legend will connect the compromised host to a pre-configured IRC server, where the attacker can issue commands individually or as a group. </p>
<p>The following MTAs / MDAs are directly impacted by Shellshock in some cases, depending on their configuration. </p>
<p>Courier Mail Server<br />
Exim<br />
QMail<br />
Postfix / Procmail </p>
<p>There is at least one Shellshock exploit for Postfix circulating online</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/25/shellshock-bash-vulnerability/comment-page-2/#comment-1258495</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 14 Oct 2014 07:11:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27586#comment-1258495</guid>
		<description><![CDATA[Bored hackers flick Shellshock button to OFF as payloads shrink
But beware of complacency, warn Akamai bods
http://www.theregister.co.uk/2014/10/03/shellshock_bored_hackers_giving_up_droves/

Malicious and benign attacks against systems vulnerable to Shellshock had halved by Sunday after peaking three days following the bug&#039;s disclosure, Akamai researchers say.

The variety of payloads targeting vulnerable sites increased dramatically over the same period before tapering off, in a possible sign that hackers were bored with the bug.

The number of unique payloads increased from 43 on day zero to a whopping 10,716 just 24 hours later. It peaked on 27 September at 20,753 before falling off.

The numbers demonstrated the effectiveness of Shellshock as an attack vector, researchers Ezra Caltum, Adi Ludmer and Ory Segal wrote in a co-authored post.

&quot;One of the troubling aspects of the Shellshock vulnerability is the ease of exploitation, which can be seen by the dramatic increase in the number of unique payloads between the first and the second days,&quot; they said.

&quot;The sheer number of creative payloads also demonstrates how effective and deadly this vulnerability can be – most of the scanning and exploitation process is already fully automated.

&quot;With such a low barrier to entry, and the simplicity of writing powerful exploits, we believe that Shellshock-based attacks are going to stay around for months if not years, and will probably top the botnet infection method charts in the near future.&quot;

Almost 300,000 gaming domains made up the vast majority of Shellshock targets, with consumer electronics, email marketing among the less affected industries.]]></description>
		<content:encoded><![CDATA[<p>Bored hackers flick Shellshock button to OFF as payloads shrink<br />
But beware of complacency, warn Akamai bods<br />
<a href="http://www.theregister.co.uk/2014/10/03/shellshock_bored_hackers_giving_up_droves/" rel="nofollow">http://www.theregister.co.uk/2014/10/03/shellshock_bored_hackers_giving_up_droves/</a></p>
<p>Malicious and benign attacks against systems vulnerable to Shellshock had halved by Sunday after peaking three days following the bug&#8217;s disclosure, Akamai researchers say.</p>
<p>The variety of payloads targeting vulnerable sites increased dramatically over the same period before tapering off, in a possible sign that hackers were bored with the bug.</p>
<p>The number of unique payloads increased from 43 on day zero to a whopping 10,716 just 24 hours later. It peaked on 27 September at 20,753 before falling off.</p>
<p>The numbers demonstrated the effectiveness of Shellshock as an attack vector, researchers Ezra Caltum, Adi Ludmer and Ory Segal wrote in a co-authored post.</p>
<p>&#8220;One of the troubling aspects of the Shellshock vulnerability is the ease of exploitation, which can be seen by the dramatic increase in the number of unique payloads between the first and the second days,&#8221; they said.</p>
<p>&#8220;The sheer number of creative payloads also demonstrates how effective and deadly this vulnerability can be – most of the scanning and exploitation process is already fully automated.</p>
<p>&#8220;With such a low barrier to entry, and the simplicity of writing powerful exploits, we believe that Shellshock-based attacks are going to stay around for months if not years, and will probably top the botnet infection method charts in the near future.&#8221;</p>
<p>Almost 300,000 gaming domains made up the vast majority of Shellshock targets, with consumer electronics, email marketing among the less affected industries.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/09/25/shellshock-bash-vulnerability/comment-page-1/#comment-1254825</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 10 Oct 2014 07:49:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27586#comment-1254825</guid>
		<description><![CDATA[&gt; I am an at home user of Ubuntu 14.04. I have bash, dash and busybox installed on my Ubuntu desktop.

You have bash installed in your box. It will be vulnerable bash if you have not updated it last well (do test to see). 
You need to have bash 4.3.27 or newer (if such has come up).
Let&#039;s assume you have vulnerable bash. If anyone can use that to hit your computer depends on what you use it for. 
The main attack vectors are:
 Web services - if you run web server and use CGI-scripts your are in danger because anyone connecting to web server can run commands
 SSH - users that have credentials to system (user account and password) might be able to run command at higher than their own right
 OpenVPN server - if you run OpenVPN server with password authentication anyone can potentially run commands on your system
 DHCP - if someone compromises your DHCP server (usually your broadband router) they can run command on your system

If you are not running web server or OpenVPN server, no worries on them. 
SSH vulnerability is an issue mainly on multi-user systems where there are many different people using the same computer with different user levels, if you are the only user of your desktop then I would not worry much...
DHCP vulnerability could be issue after if someone hacks to your DHCP server or has physical access to your LAN to put in a rogue DHCP server in...

&gt; Also, if I had a router hooked up to my computer that uses busybox and I had a firewall on that same router, would a hacker be able to compromise me that way?

The busybox as itself would not be vulnerable. If someone can hack in your router some way, they might or might not be able (depends on router design) to use it to make the DHCP attack.. Not very probable though.

&gt;  I want to know what to do to protect myself against this thing beyond what I am already doing, which is I am installing security updates every time Ubuntu tells me there is one available. Please let me know! 

Install the security updates and verify the bash version you already have. That&#039;s the best start. 
This shellshock is a serious issue if you have an Internet facing public server - you need to worry (I spend some nights on this issue on this web site to keep it safe... first quick fix with firewall rules, then bash update and taking modsecurity to use, then fixing some issues that modsecurity caused)
If you have normal desktop Linux workstation behind the firewall that you keep up-to-date it is a less of an issue.]]></description>
		<content:encoded><![CDATA[<p>> I am an at home user of Ubuntu 14.04. I have bash, dash and busybox installed on my Ubuntu desktop.</p>
<p>You have bash installed in your box. It will be vulnerable bash if you have not updated it last well (do test to see).<br />
You need to have bash 4.3.27 or newer (if such has come up).<br />
Let&#8217;s assume you have vulnerable bash. If anyone can use that to hit your computer depends on what you use it for.<br />
The main attack vectors are:<br />
 Web services &#8211; if you run web server and use CGI-scripts your are in danger because anyone connecting to web server can run commands<br />
 SSH &#8211; users that have credentials to system (user account and password) might be able to run command at higher than their own right<br />
 OpenVPN server &#8211; if you run OpenVPN server with password authentication anyone can potentially run commands on your system<br />
 DHCP &#8211; if someone compromises your DHCP server (usually your broadband router) they can run command on your system</p>
<p>If you are not running web server or OpenVPN server, no worries on them.<br />
SSH vulnerability is an issue mainly on multi-user systems where there are many different people using the same computer with different user levels, if you are the only user of your desktop then I would not worry much&#8230;<br />
DHCP vulnerability could be issue after if someone hacks to your DHCP server or has physical access to your LAN to put in a rogue DHCP server in&#8230;</p>
<p>> Also, if I had a router hooked up to my computer that uses busybox and I had a firewall on that same router, would a hacker be able to compromise me that way?</p>
<p>The busybox as itself would not be vulnerable. If someone can hack in your router some way, they might or might not be able (depends on router design) to use it to make the DHCP attack.. Not very probable though.</p>
<p>>  I want to know what to do to protect myself against this thing beyond what I am already doing, which is I am installing security updates every time Ubuntu tells me there is one available. Please let me know! </p>
<p>Install the security updates and verify the bash version you already have. That&#8217;s the best start.<br />
This shellshock is a serious issue if you have an Internet facing public server &#8211; you need to worry (I spend some nights on this issue on this web site to keep it safe&#8230; first quick fix with firewall rules, then bash update and taking modsecurity to use, then fixing some issues that modsecurity caused)<br />
If you have normal desktop Linux workstation behind the firewall that you keep up-to-date it is a less of an issue.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Becky</title>
		<link>https://www.epanorama.net/blog/2014/09/25/shellshock-bash-vulnerability/comment-page-1/#comment-1254327</link>
		<dc:creator><![CDATA[Becky]]></dc:creator>
		<pubDate>Thu, 09 Oct 2014 18:37:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=27586#comment-1254327</guid>
		<description><![CDATA[Tom, I am trying to understand all of this.  Perhaps you could answer some questions about this.

I am an at home user of Ubuntu 14.04.  I have bash, dash and busybox installed on my Ubuntu desktop.  Would I need to be worried about hackers hacking in to my computer?  Also, if I had a router hooked up to my computer that uses busybox and I had a firewall on that same router, would a hacker be able to compromise me that way?  I have been reading so much about this and am so confused by all of it that I want to know what to do to protect myself against this thing beyond what I am already doing, which is I am installing security updates every time Ubuntu tells me there is one available.  Please let me know!  You can email privately if you want to or respond here on your blog, whichever you want--I just need to know!]]></description>
		<content:encoded><![CDATA[<p>Tom, I am trying to understand all of this.  Perhaps you could answer some questions about this.</p>
<p>I am an at home user of Ubuntu 14.04.  I have bash, dash and busybox installed on my Ubuntu desktop.  Would I need to be worried about hackers hacking in to my computer?  Also, if I had a router hooked up to my computer that uses busybox and I had a firewall on that same router, would a hacker be able to compromise me that way?  I have been reading so much about this and am so confused by all of it that I want to know what to do to protect myself against this thing beyond what I am already doing, which is I am installing security updates every time Ubuntu tells me there is one available.  Please let me know!  You can email privately if you want to or respond here on your blog, whichever you want&#8211;I just need to know!</p>
]]></content:encoded>
	</item>
</channel>
</rss>
