The volume of the attack on network devices indicates the need to change the end of health devices as soon as possible

The specific ShellShock results may not be as disastrous as some of the top profile attacks and cyber attacks, writers who agree, but is a persistent problem. For example, in 2019, Talos found a world-sponsored espionage campaign called “Sea Turters” who deceived DNS Records for access to critical programs. The enemy reduced several vulnerable, including shellshock, to get the first access.

“While further confirmed the examples of the community of the Cyber-sponsored by the Cyber ​​target is limited, it may be that some developed players may try to exploit Shellshock.” The report said. Many known families as a Russian APT28 government group and North Korea Group exploiting the risk of widely used software, making a shellshock is a comprehensive investment tool and attack campaigns, writers said.

Reducing threats

In a report, Talos offered its top 10 advice for networking devices. Recommend:


Source link