Categories: SecurityWorkspace

Attackers Rush To Exploit Bash Flaw Before Systems Are Patched

As companies and software developers rush to patch vulnerabilities in the Bourne Again Shell, or Bash, attackers have already incorporated exploit code into a variety of tools, from network scanners to malware, attempting to urgently exploit the vulnerabilities before the lion’s share of systems are patched.

Web security firm CloudFlare, for example, has seen 1.5 million attacks each day against the bash vulnerability, which is popularly known as Shellshock. Cloud security rival Incapsula estimates that attacks have targeted approximately 4 percent of its customer base, according to data on the probe attempts released by the firm on Sept. 29. While many of the “attacks” could be site owners testing their servers for the vulnerability, three major spikes in network events represent widespread scanning efforts, Marc Gaffan, Incapsula co-founder and chief business officer, told eWEEK.

“If you extrapolate, you are going to get a very, very large number of Websites being targeted,” he said.

Evolving threat

Less than a week after the widespread vulnerability first became known, companies are rushing to patch the flaw in how Bash handles certain types of parameters, known as environmental variables. Many types of software, such as the Common Gateway Interface (CGI) used to add dynamic content to Websites, execute shell commands and so have an existing link to Bash.

It took five days for the original flaw to be fully patched. On September 30, Apple issued its patch for Mac OS X.

Yet attackers have not waited idly. A variety of Web traffic incorporating an exploit for Shellshock had already been noticed by security firm FireEye, which stated on Sept. 27 that the attack had been incorporated into malware droppers, backdoors and distributed denial-of-service tools. The exploit is easy to code and simple to use, according to an analysis penned by three FireEye researchers.

“The salient points to keep in mind about the CGI vector is that it can be delivered by any HTTP request parameter, the server doesn’t have to directly call Bash scripts for it to be vulnerable, and it is OS-agnostic,” they wrote. “Its only dependencies are the Web server, the CGI content it hosts, and the use of Bash as the shell.”

FireEye noted that some of the traffic originated from Russia. In its own analysis, Incapsula found that 19 percent of the traffic came from the United States and 10 percent from China. Sources from Brazil, France, Germany and the Netherlands each accounted for about 3 percent of the overall attacks, according to Incapsula’s data.

Security firm Kaspersky detected attacks within a day of the disclosure of the original flaw. Attackers attempted to use bash to have the targeted server connect back to a specific Internet address, a technique known as a reverse shell. In addition, the attack was used to install a backdoor onto vulnerable Linux systems, according to researcher Stefan Ortloff.

“The binary contains two hard-coded IP addresses,” he wrote in the analysis. “The first one is only used to notify the criminals about a new successful infection. The second IP address is used as a command-and-control server (C&C) to communicate directly with the malware.”

Are you a security expert? Try our quiz!

Originally published on eWeek.

Robert Lemos

Robert Lemos covers cyber security for TechWeekEurope and eWeek

Recent Posts

OpenAI’s ‘Operator’ Agent Automates Online Tasks

OpenAI launches AI agent called 'Operator' to automatically fill out forms, make restaurant reservations, book…

1 hour ago

Pakistan’s Parliament Passes Bill For Strict Control On Social Media

Bill passed to give Pakistani government sweeping controls on social media, but critics argue it…

2 hours ago

Indian Tribunal Suspends Meta’s Data Sharing Ban

After Meta had warned that India's data sharing ban could collapse WhatsApp's business model, tribunal…

4 hours ago

UK’s CMA Begins Probe Into Apple, Google Mobile Ecosystems

British regulator confirms investigation of Apple and Google's domination of app stores, operating systems, and…

5 hours ago

Samsung Touts AI Features With Galaxy S25 Smartphones

Launch of Samsung's Galaxy S25 Ultra, Galaxy S25+ and Galaxy S25 sees the handsets described…

8 hours ago

LinkedIn Sued Over Alleged Use Of Private Messages To Train AI

Microsoft's LinkedIn sued for allegedly using customer data, including private messages, to train AI models…

9 hours ago