Romanian hackers seem to be the perpetrators to blame for infiltrating Yahoo’s servers, as they were “working on further infiltrating the Yahoo! Network.”
The two Yahoo servers found by Hall compromised are “dip4.gq1.yahoo.com” and “api118.sports.gq1.yahoo.com” while he didn’t rule out others being compromised.
At first, Yahoo responded that, as soon as it became aware of the Shellshock bug, it began patching its systems and started closely monitoring its networks.
“Last night, we isolated a handful of our impacted servers and at this time we have no evidence of a compromise to user data,” a Yahoo spokesperson told Security Week.
Later, Yahoo CISO Alex Stamos stated that three servers of Yahoo’s Sports API had “malicious code executed on them” targeting possibly Shellshock-vulnerable servers.
“These attackers had mutated their exploit, likely with the goal of bypassing IDS/IDP or WAF filters,” Stamos said. “This mutation happened to exactly fit a command injection bug in a monitoring script our Sports team was using at that moment to parse and debug their web logs.”
Yahoo’s servers were only used to serve live game streaming on Yahoo’s Sports front-end and had no data stored on them. Yet we can be certain of one thing; Shellshock or no Shellshock, its servers have been compromised.
This is virtually helpful and informative, as this gave me greater perception to create greater ideas and solutions for my plan.Preserve replace along with your blog publish.
ReplyDeletebest website design company in coimbatore
seo company in coimbatore
logo design coimbatore
digital marketing in coimbatore