Menu
Bash malware targets embedded devices running BusyBox

Bash malware targets embedded devices running BusyBox

Attackers use malware dubbed Bashlite to scan for and install backdoors on routers and other systems running BusyBox

Attacks that exploit the Shellshock vulnerabilities recently patched in the Bash Unix deliver a malware program that tries to compromise systems running BusyBox, a collection of Unix utilities typically used on embedded devices like routers.

The backdoor-type malware is dubbed Bashlite by security researchers from Trend Micro and it infects Linux-based systems through Shellshock attack vectors.

In September, security researchers found several related vulnerabilities in the Bash shell that can allow remote code execution attacks. These vulnerabilities, collectively known as Shellshock, can be exploited through CGI scripts running on Web servers, the CUPS printing system for Unix-like operating systems, the Secure Shell (SSH), OpenVPN, SMTP servers and other services.

After it infects a system, Bashlite malware scans the network for systems that accept Telnet connections and attempts to log in using common usernames and passwords combinations: root, admin, support, 12345, 123456, pass, password and toor. It then issues a series of commands to determine if the system runs BusyBox and uses it to download two remote scripts called bin.sh and bin2.sh, the Trend Micro researchers said in a blog post.

"Devices running on BusyBox can be possibly affected by Bashlite," the researchers said. "As such, a remote attacker can issue commands or download other files on the devices thus compromising their security."

In addition to scanning for and compromising systems running BusyBox, Bashlite malware is designed to launch distributed denial-of-service attacks.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwaretrend microExploits / vulnerabilities

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.​

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments