Hackers are targeting vulnerable Web servers in QNAP network-attached storage devices Researchers have discovered hackers trying to exploit the Shellshock Bash vulnerability to compromise network attached storage devices in universities in the U.S., Japan and Korea.The attackers were taking advantage of a publicly disclosed security weakness in which the web servers embedded in the devices manufactured by QNAP have administrative privileges by default, researchers for FireEye said Wednesday.Once attackers compromise the server and get these privileges, they have full control of the device.“They (QNAP) acknowledged this particular vulnerability on their website,” Josh Gomez, security researcher at FireEye, said. Knowing the vulnerability existed; the attackers scanned the devices for Shellshock and downloaded malware using autostart script provided by the manufacturer, James Bennett, threat researcher for FireEye, said. The script is used to have programs start automatically.“The attackers did some research on these devices,” Bennett said. All QNAP devices run an embedded Linux operating sytems that is vulnerable to CVE-2014-6271, one of six flaws in GNU Bash, which stands for Bourne Again SHell. Collectively, the vulnerabilities have been dubbed Shellshock.The attacks are the first FireEye has seen targeting NAS devices, which would be desirable targets, because of the amount of data stored in them.“There’s a lot of data on these devices that could be sensitive, interesting or valuable,” Bennett said.FireEye, which monitors enterprise networks for malware, discovered attacks against about 20 QNAP devices. Most were located in Japan with a few in Korea and a couple in the U.S. All the attacks were against research universities.The QNAP attacks followed a typical pattern for exploiting Shellshock. The vulnerabilities in Bash, which is the default command shell for Linux, will execute malicious command code sent vie the Common Gateway Interface. CGI is the underpinning of the management console in the QNAP Web server.Security experts have provided half a dozen steps organizations can take to prevent Bash exploitations, including installing the latest vendor-provided patches, monitoring system logs and asking manufacturers whether their devices are vulnerable. Device that cannot be patched should be replaced. In other related news, Mullvad, a Swedish virtual private network provider, reported Tuesday that OpenVPN servers are vulnerable to Shellshock, under certain configurations.Akamai Technologies, an Internet content delivery network, reported seeing a total of 22,487 unique attacking IP addresses, with 156 being HTTP proxies. Almost 70 percent of the addresses originated from the U.S.The top domain under attack was online gaming with consumer electronics and online email marketing a distant second and third, respectively. Related content feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO CSO and CISO C-Suite news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe