Categories: SecurityWorkspace

Attackers Rush To Exploit Bash Flaw Before Systems Are Patched

As companies and software developers rush to patch vulnerabilities in the Bourne Again Shell, or Bash, attackers have already incorporated exploit code into a variety of tools, from network scanners to malware, attempting to urgently exploit the vulnerabilities before the lion’s share of systems are patched.

Web security firm CloudFlare, for example, has seen 1.5 million attacks each day against the bash vulnerability, which is popularly known as Shellshock. Cloud security rival Incapsula estimates that attacks have targeted approximately 4 percent of its customer base, according to data on the probe attempts released by the firm on Sept. 29. While many of the “attacks” could be site owners testing their servers for the vulnerability, three major spikes in network events represent widespread scanning efforts, Marc Gaffan, Incapsula co-founder and chief business officer, told eWEEK.

“If you extrapolate, you are going to get a very, very large number of Websites being targeted,” he said.

Evolving threat

Less than a week after the widespread vulnerability first became known, companies are rushing to patch the flaw in how Bash handles certain types of parameters, known as environmental variables. Many types of software, such as the Common Gateway Interface (CGI) used to add dynamic content to Websites, execute shell commands and so have an existing link to Bash.

It took five days for the original flaw to be fully patched. On September 30, Apple issued its patch for Mac OS X.

Yet attackers have not waited idly. A variety of Web traffic incorporating an exploit for Shellshock had already been noticed by security firm FireEye, which stated on Sept. 27 that the attack had been incorporated into malware droppers, backdoors and distributed denial-of-service tools. The exploit is easy to code and simple to use, according to an analysis penned by three FireEye researchers.

“The salient points to keep in mind about the CGI vector is that it can be delivered by any HTTP request parameter, the server doesn’t have to directly call Bash scripts for it to be vulnerable, and it is OS-agnostic,” they wrote. “Its only dependencies are the Web server, the CGI content it hosts, and the use of Bash as the shell.”

FireEye noted that some of the traffic originated from Russia. In its own analysis, Incapsula found that 19 percent of the traffic came from the United States and 10 percent from China. Sources from Brazil, France, Germany and the Netherlands each accounted for about 3 percent of the overall attacks, according to Incapsula’s data.

Security firm Kaspersky detected attacks within a day of the disclosure of the original flaw. Attackers attempted to use bash to have the targeted server connect back to a specific Internet address, a technique known as a reverse shell. In addition, the attack was used to install a backdoor onto vulnerable Linux systems, according to researcher Stefan Ortloff.

“The binary contains two hard-coded IP addresses,” he wrote in the analysis. “The first one is only used to notify the criminals about a new successful infection. The second IP address is used as a command-and-control server (C&C) to communicate directly with the malware.”

Are you a security expert? Try our quiz!

Originally published on eWeek.

Robert Lemos

Robert Lemos covers cyber security for TechWeekEurope and eWeek

Recent Posts

Google Staff Question Layoffs After Record Earnings

Staff at Google question CEO Sundar Pichai over 'significant decline' in workforce morale amid ongoing…

1 day ago

OpenAI To Announce Google Search Competitor Next Week – Report

Google's search domination to be challenged next week, with OpenAI reportedly set to announce its…

1 day ago

Biden Admin Set To Impose Tariffs On Chinese Electric Vehicles

America reportedly set to announce next week import tariffs on strategic Chinese sectors, including electric…

2 days ago

TikTok To Label AI-Generated Content From Other Platforms

AI-generated content such as video and images are going to be labelled by TikTok using…

2 days ago

Neuralink’s First Human Brain Implant Develops Malfunction

Neuralink brain implant embedded in 29-year-old patient named Noland Arbaugh develops a fault, but is…

2 days ago

Tesla Ordered To Provide NHTSA With Autopilot Recall Data

US agency seeks data from Tesla on Autopilot recall, amid reports US prosecutors are probing…

2 days ago