Tag Archive for: She’ll

Power Shell is a powerful malware tool

PowerShell used as a tool in compound malware attacks is becoming more common, with 38% of all attacks seen by IT security vendor CarbonBlack and its partners involving the native Windows scripting language.

ben johnson

Ben Johnson

Its use is so common in enterprises for legitimate purposes that most security devices and personnel don’t regard it as a threat, says Ben Johnson, the chief security strategist at CarbonBlack.

That makes it all the more effective as a component of attacks. Its scripts can run in memory only so it never creates a file on disk, Johnson says. “It creates less noise on the system,” so it’s less likely to draw attention to itself, he adds.

To read this article in full or to leave a comment, please click here

Network World Tim Greene

Ghost in the (Bourne Again) Shell: Fallout of Shellshock far from over

The long, painful rollout of patches to a security flaw in the Bourne Again Shell (bash) has left thousands of systems still vulnerable, and malware based on the vulnerability continues to spread, according to a number of security experts. But even for organizations that have already applied the patch for what has been dubbed the “Shellshock” vulnerability, the cleanup may not be over—and it could be long and expensive.

Soon after the Shellshock bug was publicly disclosed and its initial patch was distributed, weaknesses in the patch itself and additional security vulnerabilities were uncovered by developers dealing with the issue. And within a day of the disclosure, attacks exploiting the vulnerability were found in the wild. Some of those attacks are still trying to spread—and in some cases, they’re using Google searches to help them find potential targets. Successful attacks may have made changes to the targeted systems that would not have been corrected by the application of the patch.

The problem with Shellshock is similar to problems that emerged after the Heartbleed bug and numerous other vulnerabilities—while organizations struggle to understand the disclosures, how they affect their systems, and how to successfully implement patches, others—including security researchers—race to build proof-of-concept attacks based on them to demonstrate exactly how dire they are. And those proofs of concept often get picked up by cybercriminals and others with bad intent before organizations can effectively patch them—using them to exploit systems in ways that are much longer-lasting than the vulnerability du jour.

Read 12 remaining paragraphs | Comments


Ars Technica » Technology Lab

Linux/Unix/Mac User – Shell Shock Vulnerability

Today, the MAC dovetails nicely; Windows Word for MAC is an option that works well and helps MAC compete. All that being said, hackers are forced to write damaging programs for PCs and now MAC. The days of MAC being able to fly under the hacker’s radar is …
mac hacker – read more

HP’s Whitman Says She’ll Keep Strategies Begun by Apotheker (Aaron Ricadela/Bloomberg)

Aaron Ricadela / Bloomberg:
HP’s Whitman Says She’ll Keep Strategies Begun by Apotheker  —  Sept. 23 (Bloomberg) — Hewlett-Packard Co. Chief Executive Officer Meg Whitman plans to stick by strategies set in motion by her predecessor, Leo Apotheker, betting that investors prefer steady leadership to another unsettling change of course.

Read more