Risk
9/17/2010
04:55 PM
50%
50%

Security Exploits Increasingly Complex

A study from HP TippingPoint finds that web applications are still an attack magnet, but hackers now appear to be collaborating more closely to spot new flaws.

More than 80% of network attacks now target web-based systems, according to a new study released by HP TippingPoint.

"That trend, in and of itself, wasn't obviously too newsworthy, but what was really striking to us was that most of these attacks are so much more sophisticated than they were," said Mike Dausin, manager of Advanced Security Intelligence for HP TippingPoint DVLabs. "One of the exploits we see these days actually has release notes in it."

Unfortunately, that alone suggests a hitherto previously unseen level of black hat collaboration. "Hackers are taking this very seriously and are collaborating with other black hats to develop code that has a much better chance of exploiting people when they visit their malicious sites," he said. Their goals, as ever, continue to be largely financial.

The report also found that there are a striking number of zero-day vulnerabilities at large at any given time, affecting some of the most used software products. "We may know of five, six, seven at any given time," he said. "People who are savvy in the industry already know this, but most people we tell just don't realize how many vulnerabilities there are in the products they use every day."

What's also changed is the number of people who independently discover these vulnerabilities. "Two years ago, it was very anomalous for us to find a vulnerability that someone else had found, but as of last year and certainly continuing this year, it was very common for two researchers to find the exact same vulnerability in a product," said Dausin.

Partially, that's to do with vulnerability tool kits getting better, allowing more researchers to discover bugs. But unfortunately, if researchers with good intentions can unearth more bugs, so can people with other plans. "It would be naive to say that only the legitimate researchers are finding these vulnerabilities, especially since multiple researchers are finding them at the same time," he said.

What can be done to help break the efficacy of these zero-day attacks? "One thing we expect will happen in the near future is that PC users will start to move toward a smartphone-type model, where the average PC will only be able to download and install an application from an app store," said Dausin. For viruses that rely on executing arbitrary code, "many of those problems go away" if you lock down the ability to execute executables, he said.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4632
Published: 2015-01-31
VMware vSphere Data Protection (VDP) 5.1, 5.5 before 5.5.9, and 5.8 before 5.8.1 does not properly verify X.509 certificates from vCenter Server SSL servers, which allows man-in-the-middle attackers to spoof servers, and bypass intended backup and restore access restrictions, via a crafted certifica...

CVE-2014-7287
Published: 2015-01-31
The key-management component in Symantec PGP Universal Server and Encryption Management Server before 3.3.2 MP7 allows remote attackers to trigger unintended content in outbound e-mail messages via a crafted key UID value in an inbound e-mail message, as demonstrated by the outbound Subject header.

CVE-2014-7288
Published: 2015-01-31
Symantec PGP Universal Server and Encryption Management Server before 3.3.2 MP7 allow remote authenticated administrators to execute arbitrary shell commands via a crafted command line in a database-backup restore action.

CVE-2014-8266
Published: 2015-01-31
Multiple cross-site scripting (XSS) vulnerabilities in the note-creation page in QPR Portal 2014.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) title or (2) body field.

CVE-2014-8267
Published: 2015-01-31
Cross-site scripting (XSS) vulnerability in QPR Portal 2014.1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the RID parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.