Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Attackers exploit ShellShock via SMTP to distribute malware

Attackers exploit ShellShock via SMTP to distribute malware

2014/10/28

Securityweek - (International) Binary Defense Systems researchers reported that attackers are leveraging the ShellShock vulnerability in GNU Bash to target servers by adding the ShellShock payload to email subject, from, and to fields, abusing the Simple Mail Transfer Protocol (SMTP). If a system is compromised, a Perl-based IRC bot is downloaded and the SMTP gateway is added to a botnet designed for distributed denial of service (DDoS) attacks.

Source: http://www.securityweek.com/attackers-exploit-shellshock-smtp-distribute-malware

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:22:16