United States

Don't Let Your System Become 'Shellshocked'

Jan 05, 2015
From the Advisory Institute

ForensicFocus | January 2015

In nearly every corner of the Internet, systems security professionals are seeing hackers trying to exploit a Bash shell vulnerability dubbed "shellshock". Remote attackers can execute arbitrary code on vulnerable systems using Bash, or Bourne-Again Shell. Bash is the program behind the most popular shell interpreter on Linux-based operating systems.

This article explains how attacks test vulnerability, identifies four apparent hacker purposes, and recommends actions to thwart attacks.

Read Don't Let Your System Become 'Shellshocked'

KPMG.com (US) | KPMG International | Accessibility

Legal | Privacy | Terms of Use

© 2015 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.