Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/22/2013
07:19 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Report: 70% Of Exploit Kits Out Of Russia

Most vulnerabilities used in kits employ older exploits

Old bugs never really die, a new study shows: Nearly 60 percent of vulnerabilities used by popular exploit kits are more than two years old, according to a new study by Solutionary's Security Engineering Research Team (SERT).

And 70 percent of the 26 exploit kits reviewed in the study were released or created in Russia. The next-closest region for kit origination is China, with 7.7 percent. And, interestingly, despite the wave of DDoS attacks on U.S. banks, there was an overall reduction in distributed denial-of-service attacks for the period of the study, the fourth quarter of 2012.

The wildly popular and pervasive BlackHole 2.0 actually exploits fewer vulnerabilities than other kits do, the report found. The Phoenix exploit kit, meanwhile, uses 16 percent of all bugs being exploited.

"SERT identified a large number of the exploit kits have been developed and distributed from Eastern Europe. SERT sees a continuation of previous trends with the majority of attacks and exploit kit hosts coming from Russia, followed by China and then Brazil," the report says.

The widespread use of old bugs demonstrates how many organizations still aren't updating and patching systems, the report says. Some of the oldest exploit code dated back to 2004.

"The fact that cyber criminals are able to penetrate network defenses by targeting aging vulnerabilities and using old techniques demonstrates that many organizations are still playing catch-up when it comes to cybersecurity. Tight budgets, inability to convince stakeholders at all levels that security should be a priority, and a shortage of research resources could be among the reasons why many security and risk teams are continuing to operate in reactive mode," says Rob Kraus, SERT director of research.

Solutionary's SERT also found that antivirus and anti-malware software misses 67 percent of malware and catches 33 percent. Some 30 percent of malware samples were JavaScript malware variants used for redirection, obfuscation, and encryption, the report says, all of which are used in BlackHole. And 18 percent of the malware was tied to BlackHole.

"Exploit kits largely focus on targeting end-user applications," Solutionary's Kraus says. "As a result, it is vital that organizations pay close attention to patch management and endpoint security controls in order to significantly decrease the likelihood of compromise."

The full report is available here for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Can you smell me now?
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11844
PUBLISHED: 2020-05-29
There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation.
CVE-2020-6937
PUBLISHED: 2020-05-29
A Denial of Service vulnerability in MuleSoft Mule CE/EE 3.8.x, 3.9.x, and 4.x released before April 7, 2020, could allow remote attackers to submit data which can lead to resource exhaustion.
CVE-2020-7648
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
CVE-2020-7650
PUBLISHED: 2020-05-29
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
CVE-2020-7654
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.