Attackers exploited more new vulnerabilities in January than usual, writing exploits for half of 'critical' vulnerabilities

Dark Reading Staff, Dark Reading

February 4, 2011

2 Min Read

The number of exploited vulnerabilities jumped dramatically last month, with more than 60 percent of new vulnerabilities being exploited, a new report says.

Exploit activity is typically at a rate of 30 to 40 percent, according to Fortinet's newly released January 2011 Threat Landscape report. Close to half of "critical" vulnerabilities were exploited by attackers, the report found.

"It is no secret that software vulnerabilities continue to be disclosed in large numbers on an ongoing basis -- especially critically rated ones," said Derek Manky, senior security strategist at Fortinet's FortiGuard Labs. "Hackers are sinking their teeth into unprotected systems, thanks to readily available exploit code and attack frameworks that support these new vulnerabilities. Since they are freshly disclosed, not everyone may have up-to-date signatures or proper patches in place."

At the top of the list of malware detected by Fortinet were the Feebs, Buzus, and Virut families. "These are not new threats, yet they remain quite persistent and active. Feebs is a mass mailer that uses Javascript to infect systems: the mail will contain a password protected archive, along with the information in the mail body. Buzus continues to be active in the spam scene, sending infected attachments of itself using a variety of spam campaigns linked to Twitter, Facebook, Google, Hallmark and Hi5. They’re clearly putting more effort into their social engineering tactics by leveraging well known names," Manky blogged.

Virut is especially difficult because it contains a bot component, he said in his post. "FortiGuard Labs observed Virut downloading other botnets (VBCF) -- meaning an infected system would soon have multiple pieces of malware in place. Virut is one of the most persistent botnets we see today, since it is tough to remove from an infected system, uses a public IRC domain (has not been taken offline during its four-year run), and has hybrid spreading capabilities."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights