Menu
Bash malware targets embedded devices running BusyBox

Bash malware targets embedded devices running BusyBox

Attackers use malware dubbed Bashlite to scan for and install backdoors on routers and other systems running BusyBox

Attacks that exploit the Shellshock vulnerabilities recently patched in the Bash Unix deliver a malware program that tries to compromise systems running BusyBox, a collection of Unix utilities typically used on embedded devices like routers.

The backdoor-type malware is dubbed Bashlite by security researchers from Trend Micro and it infects Linux-based systems through Shellshock attack vectors.

In September, security researchers found several related vulnerabilities in the Bash shell that can allow remote code execution attacks. These vulnerabilities, collectively known as Shellshock, can be exploited through CGI scripts running on Web servers, the CUPS printing system for Unix-like operating systems, the Secure Shell (SSH), OpenVPN, SMTP servers and other services.

After it infects a system, Bashlite malware scans the network for systems that accept Telnet connections and attempts to log in using common usernames and passwords combinations: root, admin, support, 12345, 123456, pass, password and toor. It then issues a series of commands to determine if the system runs BusyBox and uses it to download two remote scripts called bin.sh and bin2.sh, the Trend Micro researchers said in a blog post.

"Devices running on BusyBox can be possibly affected by Bashlite," the researchers said. "As such, a remote attacker can issue commands or download other files on the devices thus compromising their security."

In addition to scanning for and compromising systems running BusyBox, Bashlite malware is designed to launch distributed denial-of-service attacks.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags trend microsecurityExploits / vulnerabilitiesmalware

Featured

Slideshows

Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
Show Comments