Could the Bash bug cause an internet MELTDOWN? Hackers scramble to exploit Shellshock flaw as experts warn your details may be at risk
comments
Hackers have begun exploiting the devastating Bash bug, using worm viruses to scan for vulnerable computers before infecting them.
The Bash bug, also known as 'Shellshock', is a flaw in a piece of software known as 'Bash' that runs the command prompt on many Unix computers.
As damage from the bug spreads, many of the early patches designed to safeguard computers are proving ineffective.
Errata security researcher Robert Graham tweeted (pictured) an example of how the bug can be exploited, and how code can be added, to websites on Macs running OSX. He warned that Bash is 'probably a bigger deal than Heartbleed' because it could threaten the security of millions of websites
'That's a problem. It's been a little over 24 hours and we're still in the same boat,' said Mat Gangwer, lead security consultant at Rook Security.
'People are kind of freaking out. Rightfully so.'
Expert Richard Stiennon wrote that the code could quickly create a 'SQL Slammer type internet meltdown.'
This was a specific kind of attack that targeted the web's infastructure and caused it slow significantly in 2003.
This includes Linux, which is used in everything from cars to cameras, as well as the Raspberry Pi, and the bug could also affect Android, Windows and IBM machines.
All Apple's Mac OS X are also affected, as well as around half of all websites, security experts claim.
Hackers are already using massive internet scans to find vulnerable servers to attack, according to Robert Graham of Errata Security, writing In a blog post yesterday.
All Apple's Mac OS X are also affected as well as around half of all websites, security experts claim
In a test, Mr Graham ran a IP scan and found 3,000 vulnerable systems before the scan crashed.
Just a few hours later, Mr Graham found that someone was already using his method to attack computers.
'Someone is using mass scan to deliver malware,' Mr Graham wrote in an update. 'They'll likely have compromised most of the systems I've found by tomorrow morning.'
The attack has become known as 'Thanks, Rob' worm, and show the dangers of how short-term attacks could happen before devices are updated with a patch.
'One key question is whether Mac OS X and iPhone DHCP service is vulnerable, he said.
'Once the worm gets behind a firewall and runs a hostile DHCP server, that would be "game over" for large networks.'
Many experts claim the flaw could be 'bigger than Heartbleed', a flaw in Open SSL encryption that put every computer user at risk earlier this year.
'The impact is very severe, it's not overstating it to say it's a more serious bug than Heartbleed,' Professor Tim Watson, Director of the Cyber at Warwick University told MailOnline.
'The primary way this is going to be exploited is through the web… a hacker can use the bug to put malicious things on the website or to steal information, like banking details.'
Many Linux providers, including Red Hat, have already prepared patches, but Apple users were left waiting for an update for OS X. Apple representatives could not be reached.
Tavis Ormandy, a Google security researcher, said via Twitter that the patches seemed 'incomplete.'
Bash stands for Bourne Again Shell. It is what's called a command-line shell that lets users control software programs and features. Commands are sent to these programs by typing text into a particular area of code. This code is typically restricted to programmers, but the Bash bug leaves it open to attack from anyone
'There is a lot of speculation out there as to what is vulnerable, but we just don't have the answers,' said Marc Maiffret, chief technology officer of cybersecurity firm BeyondTrust. 'This is going to unfold over the coming weeks and months.'
Russian security software maker Kaspersky Lab reported that a computer worm has begun infecting computers by exploiting the Bash bug.
The malicious software can take control of an infected machine, launch denial-of-service attacks on websites to disrupt their operations and scan for other vulnerable devices, including routers, said Kaspersky researcher David Jacoby.
He said he did not know who was behind the attacks and could not name any victims.
'The primary way this is going to be exploited is through the web… a hacker can use the bug to put malicious things on the website or to steal information, like banking details.'
The Heartbleed flaw in Open SSL encryption affected millions of sites earlier this year. By comparison, Heartbleed only allowed hackers to spy on computers; not take control of them
The bug, could potentially allow hackers to gain access to every internet-enabled device in a person's home using something as innocuous as a smart lightbulb.
The danger with this, in particular, is that once it has access to an internet-connected device it can jump onto others, in theory. This includes smart locks that open front doors.
Errata security researcher Robert Graham tweeted an example of how the bug can be exploited, and how code can be added, to websites on Macs running OSX.
By comparison, 'Heartbleed' - dubbed a 'critical security flaw' at the time - only allowed hackers to spy on computers, not take control of them.
Bash does not require users to rush change their passwords, but it does provide another way for hackers to take control of computers and devices.
'The method of exploiting this issue is also far simpler. You can just cut and paste a line of code and get good results,' according to Dan Guido, chief executive of cybersecurity firm Trail of Bits.
Its potential to disrupt Apple Mac computers, which uses the Bash software, is of particular concern, experts warned.
The bug could allow hackers to gain access to every internet-enabled device in a person's home.The danger with this is that once it has access to a internet-connected device it can jump onto others in the home, in theory. This includes smart locks, such as the August lock (pictured), that open front doors remotely
The only solution is to update every device that is vulnerable with a patch. And this can only be done by website and server owners, and by individuals on their home computers.
Tod Beardsley, an engineering manager at cybersecurity firm Rapid7, warned the bug was rated a '10' for severity, meaning it has maximum impact.
He also rated it 'low' for complexity of exploitation, meaning it is relatively easy for hackers to launch attacks.
'Using this vulnerability, attackers can potentially take over the operating system, access confidential information, make changes, et cetera,' Mr Beardsley said.
'Anybody with systems using Bash needs to deploy the patch immediately.'
'Heartbleed,' discovered in April, was a bug in an open-source encryption software called OpenSSL.
The bug put the data of millions of people at risk as OpenSSL is used in about two-thirds of all websites.
It also forced dozens of technology companies to issue security patches for hundreds of products that use OpenSSL.
Bash is a shell, or command prompt software, produced by the non-profit Free Software Foundation. Officials at that group could not be reached for comment.
Put the internet to work for you.
0 comments:
Post a Comment