In the past few weeks, you’ve probably heard some pretty scary news about Shellshock, the vulnerability that impacts “bash” software. According to some security researchers, Shellshock could potentially be more dangerous than Heartbleed, the open/SSL bug that posed a huge threat to businesses a few months ago!
So how does the vulnerability work? That’s simple: the vulnerability allows hackers to infect their own malicious code into bash. Once the hacker injects malicious code, they’re able to:
- Access and steal sensitive information.
- Install malware onto users computers.
- Control the servers remotely.
According to Jonathan Hall, Cyber Security Researcher, Yahoo is one of the first major companies to experience an attack via the vulnerability since the security bug’s disclosure on September 24th, 2014.
Do You Spend Time on Yahoo Games? Keep An Eye Out for Signs of Data Theft or Malware Infections – The Yahoo Games Servers Were Hacked!
On Hall’s website, he claims Romanian hackers have managed to use the Shellshock bug to infiltrate Yahoo servers! He says three servers have been breached, including Yahoo Games, one of the largest free online game collections available on the Internet.
So what does this mean for everyone who visits Yahoo Games on a daily basis? Well, if you’re playing games on the website, hackers could’ve easily installed malware on your computer, or worse, stolen your private information.
When Hall notified Yahoo, Elisa Shyu, a spokeswoman, responded, “As soon as we became aware of the issue, we began patching our systems and have been closely monitoring our network. We isolated a handful of our impacted servers, and at this time, we have no evidence of a compromise to user data.”
While Shyu’s comment is reassuring, it’s always better safe than sorry! We recommend following a few simple tips to mitigate the risks of an attack:
- Install and run anti-virus software: If you’re not running anti-virus software on a regular basis, it’s a good time to start. Install and run anti-virus software and make sure it’s always up-to-date.
- Change your passwords: Make sure you’ve changed all of your account passwords. Also keep in mind; your passwords should be a combination of letters, symbols, and numbers.
- Install a reliable firewall: A reliable firewall should be installed and configured properly to protect against malicious and dangerous incoming traffic.
Feeling concerned about the attack? To learn more, give us a call or send us an email. We are happy to help you stay up to date on the latest security threats!
My passion is to make my mark on the world in a positive and lasting way. I want to set an example for my son that his father can compete with integrity in today’s world, be very successful, and leave the world a better place for him.
Combining my technical/business-based education with a long career steadily progressing up the corporate ladder, I decided to build a company that held true to my values. So, I founded and designed the next generation of IT support firm: CTECH Consulting Group Inc. We are a completely automated, cloud-based IT company designed to compete against any other IT firm without the overhead. We promote a lifestyle to all our staff where they can work anywhere, at any time, access any information on any device that is relevant to their job, and collaborate with anyone they want to.