Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/29/2011
04:18 PM
50%
50%

Expert: Attacks, Not Vulnerabilities, Are Keys To IT Defense

Attackers are increasingly cribbing code from existing exploits, rather than creating new ones

In the past year, attackers have shifted from mining software advisories for new vulnerabilities to grabbing code from zero-day disclosures, bugs bounty programs, and targeted attacks, according to a security expert.

Security consultant Daniel Guido said last week in a presentation at the Source Boston conference that although thousands of vulnerability reports are issued every year, only 13 of the vulnerabilities discovered in the past year and 27 of the flaws discovered in the past two years were involved in the most popular exploit kits used to fuel mass attacks.

On the other hand, an increasing number of those kits incorporate exploits copied from advanced targeted attacks aimed at enterprises.

"We can step back and study these things that are coming after us, and we can build more informed defenses that are more effective against those particular threats and that are less costly than not having done this process to begin with," Guido said.

Defenders should pay attention to these emerging exploit kits because systems hardened against those attacks would also be immune to the mass attacks that frequently target specific networks, Guido said.

Rather than focus on the more than 8,000 vulnerabilities found in 2010, according to data from security-services firm Secunia, companies need to focus on the techniques that attackers are using, Guido said.

"The goal is not to create invulnerable software, but to minimize the attack. Somewhere along the line we forgot about that," he said. "You have to realize that these applications have vulnerabilities, no matter how many patches we apply or how many pieces of malware we write signatures for."

Focusing on attacks and not vulnerabilities can help companies prioritize their defensive efforts, says Dino Dai Zovi, a well-known independent security researcher. While 27 vulnerabilities threatened the average company in 2009 and 2010, the other 99.7 percent of vulnerabilities could have been given a lesser priority for patching, he says.

"If you look at it that way, you realize that vulnerabilities just don't matter at all," Dai Zovi says. "There is almost no level of mobilization that we -- vendors, organizations, and everyone involved -- could mount to get all these vulnerabilities off our systems in the span of a few years."

Attackers attempt to economize their efforts by copying successful exploits that can reach many computers, rather than writing such exploits themselves, experts say. For example, Guido found that out of the 15 exploit kits widely used in the underground, 11 crimeware frameworks used Java exploits. Turning off Java in the Internet zone could have prevented any attacks based on those vulnerabilities.

Another key defense mechanism is turning on data-execution protection (DEP), Guido said. The exploit packs Guido studied contain methods of compromising systems using 19 memory-corruption vulnerabilities. By turning on DEP, the exploitation of 14 of those vulnerabilities would have been prevented, he said.

"We now know how effective our particular defenses are," Guido said. "We have hard numbers now about how effective, say, DEP is against attacks."

Defense-in-depth still matters, Guido said, and companies should still have a process to patch their vulnerabilities. But to help prioritize their efforts, companies should first protect against the most likely attacks, he noted.

"How can you protect yourself against [advanced persistent threats], when you can't even protect yourself against being accidentally hacked?" Guido asked.

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...