Yahoo ShellshockIn the past few weeks, you’ve probably heard some pretty scary news about Shellshock, the vulnerability that impacts “bash” software. According to some security researchers, Shellshock could potentially be more dangerous than Heartbleed, the open/SSL bug that posed a huge threat to businesses a few months ago!

So how does the vulnerability work? That’s simple: the vulnerability allows hackers to infect their own malicious code into bash. Once the hacker injects malicious code, they’re able to:

  • Access and steal sensitive information.
  • Install malware onto users computers.
  • Control the servers remotely.

According to Jonathan Hall, Cyber Security Researcher, Yahoo is one of the first major companies to experience an attack via the vulnerability since the security bug’s disclosure on September 24th, 2014.

Do You Spend Time on Yahoo Games? Keep An Eye Out for Signs of Data Theft or Malware Infections – The Yahoo Games Servers Were Hacked!

On Hall’s website, he claims Romanian hackers have managed to use the Shellshock bug to infiltrate Yahoo servers! He says three servers have been breached, including Yahoo Games, one of the largest free online game collections available on the Internet.

So what does this mean for everyone who visits Yahoo Games on a daily basis? Well, if you’re playing games on the website, hackers could’ve easily installed malware on your computer, or worse, stolen your private information.

When Hall notified Yahoo, Elisa Shyu, a spokeswoman, responded, “As soon as we became aware of the issue, we began patching our systems and have been closely monitoring our network. We isolated a handful of our impacted servers, and at this time, we have no evidence of a compromise to user data.”

While Shyu’s comment is reassuring, it’s always better safe than sorry! We recommend following a few simple tips to mitigate the risks of an attack:

  1. Install and run anti-virus software: If you’re not running anti-virus software on a regular basis, it’s a good time to start. Install and run anti-virus software and make sure it’s always up-to-date.
  2. Change your passwords: Make sure you’ve changed all of your account passwords. Also keep in mind; your passwords should be a combination of letters, symbols, and numbers.
  3. Install a reliable firewall: A reliable firewall should be installed and configured properly to protect against malicious and dangerous incoming traffic.

Feeling concerned about the attack? To learn more, give us a call or send us an email. We are happy to help you stay up to date on the latest security threats!

Latest Blog Posts

What Your Organization Must Know About Cyber Liability Insurance
What Your Organization Must Know About Cyber Liability Insurance
Read More
What Does Cloud Computing Really Mean?
What Does Cloud Computing Really Mean?
Read More
New Information Technology Trends Taking Businesses By Storm In 2025
New Information Technology Trends Taking Businesses By Storm In 2025
Read More
Read The Tech Blog