« Simplivity’s response to the Shellshock issue | Main | Square has a new update in both hardware and software available for free! »
Tuesday
Oct072014

Press Release: Sophos on ShellShock

SophosSecurity made simple.
 
 
Shellshock: What you can do to stay safe

Bash Shellshock – What Is It?

Shellshock is a serious security bug in Bash, a shell commonly used in computers running Linux, UNIX and OS X. Shellshock could allow an attacker to execute malicious commands across the Internet on remote computers, notably web servers.

The Threat

Cybercriminals are trying to exploit Shellshock to steal data and compromise servers with malware. SophosLabs has seen malware in the wild that seeks to exploit Shellshock to gain access to a server and call home for instructions.

This kind of malware could infect servers to create a botnet, which cybercriminals use to distribute zombie malware, or for turning the botnet into a weapon for launching distributed denial-of-service (DDoS) attacks on web servers.

Sophos Can Help

Sophos products protect against Shellshock attacks in several ways:

Sophos Antivirus blocks malware-related payloads exploiting Shellshock in Linux, UNIX and OS X

   

Web Application Firewall (WAF) and Intrusion Prevention System (IPS) rules in Sophos UTM stop Shellshock requests before they reach the server

   

Advanced Threat Protection (ATP) in Sophos UTM blocks malware call-home attempts, and creates a threat alert for malicious traffic

Visit Sophos.com/shellshock for the latest news and security advice from the experts at Sophos.

image

PrintView Printer Friendly Version

EmailEmail Article to Friend

Reader Comments

There are no comments for this journal entry. To create a new comment, use the form below.

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>