Risk
9/17/2010
04:55 PM
50%
50%

Security Exploits Increasingly Complex

A study from HP TippingPoint finds that web applications are still an attack magnet, but hackers now appear to be collaborating more closely to spot new flaws.

More than 80% of network attacks now target web-based systems, according to a new study released by HP TippingPoint.

"That trend, in and of itself, wasn't obviously too newsworthy, but what was really striking to us was that most of these attacks are so much more sophisticated than they were," said Mike Dausin, manager of Advanced Security Intelligence for HP TippingPoint DVLabs. "One of the exploits we see these days actually has release notes in it."

Unfortunately, that alone suggests a hitherto previously unseen level of black hat collaboration. "Hackers are taking this very seriously and are collaborating with other black hats to develop code that has a much better chance of exploiting people when they visit their malicious sites," he said. Their goals, as ever, continue to be largely financial.

The report also found that there are a striking number of zero-day vulnerabilities at large at any given time, affecting some of the most used software products. "We may know of five, six, seven at any given time," he said. "People who are savvy in the industry already know this, but most people we tell just don't realize how many vulnerabilities there are in the products they use every day."

What's also changed is the number of people who independently discover these vulnerabilities. "Two years ago, it was very anomalous for us to find a vulnerability that someone else had found, but as of last year and certainly continuing this year, it was very common for two researchers to find the exact same vulnerability in a product," said Dausin.

Partially, that's to do with vulnerability tool kits getting better, allowing more researchers to discover bugs. But unfortunately, if researchers with good intentions can unearth more bugs, so can people with other plans. "It would be naive to say that only the legitimate researchers are finding these vulnerabilities, especially since multiple researchers are finding them at the same time," he said.

What can be done to help break the efficacy of these zero-day attacks? "One thing we expect will happen in the near future is that PC users will start to move toward a smartphone-type model, where the average PC will only be able to download and install an application from an app store," said Dausin. For viruses that rely on executing arbitrary code, "many of those problems go away" if you lock down the ability to execute executables, he said.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft Word Vuln Went Unnoticed for 17 Years: Report
Kelly Sheridan, Associate Editor, Dark Reading,  11/14/2017
Companies Blindly Believe They've Locked Down Users' Mobile Use
Dawn Kawamoto, Associate Editor, Dark Reading,  11/14/2017
New Locky Ransomware Takes Another Turn
Kelly Sheridan, Associate Editor, Dark Reading,  11/10/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.