BASHLITE Affects Devices Running on BusyBox | Routers | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

When news of the Shellshock vulnerability broke out at the end of September, we spotted several attacks that leveraged the said vulnerability, thus manifesting the prevalence or even evolution on how attackers used the exploit. For instance, attackers used Shellshock to target SMTP serverslaunch botnet attacks, and even to download KAITEN source code among others.