Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Zero-Days Top 2006 Attack List

Attackers' fondest desire is to develop an exploit that hasn't been patched yet, experts say

"Zero day" was the mantra for attackers in 2006, and the trend shows no signs of letting up next year, according to a new report issued by The SANS Institute earlier today.

In its annual, in-depth study of the Internet's most popular online exploits, the security research and training organization found that zero-day attacks have skyrocketed over the past year.

"In 2006, we've seen a significant rise in attacks that take advantage of zero-day vulnerabilities, leaving a user or system unable to defend against the attack, since there is no patch available," says Marc Sachs, director of the SANS Internet Storm Center and SRI International.

The interest in zero-day exploits is increasing as companies and end users improve their patch management, says Rohit Dahmankar, senior manager of security research at TippingPoint Technologies Inc. "As automated patch management has emerged, we've seen greater interest in zero-day attacks," he says.

Microsoft Corp. (Nasdaq: MSFT) applications, particularly Office programs such as Excel and PowerPoint, are a key target for these attacks, Sachs says. Such application-level attacks often circumvent traditional security defenses such as firewalls and IDSs, and usually aren't handled by antivirus tools. "This fact is well known to the criminal and espionage communities, and is one of the key reasons for the rapid growth of this attack methodology," says Dahmankar.

Qualys Inc. , a security vendor that has been tracking attacks on the Microsoft suite, has seen a threefold increase in instances of attacks on those applications in the last year, according to Amol Sarwate, manager of Qualys's Vulnerability Management Lab. "About 20 percent of those attacks were zero-day," he says.

Many of the zero-day attacks on Windows applications are initiated in China, according to Sachs. The country's lax position on intellectual property rights makes it relatively easy for attackers to get access to Microsoft source code, and there are few law enforcement agencies investigating such attacks on other countries, he observes.

Attacks on U.S. military and government sites are also on the rise, according to the SANS Institute report. A U.S. Air Force general recently conceded that "petabytes" of its data had been stolen by foreign governments, and that the Department of Commerce recently announced plans to replace hundreds of computers because of security vulnerabilities, according to Alan Paller, director of research for the Institute.

Voice over IP technology has also become a popular target for attackers, the SANS experts say. "The FBI reports that many VOIP systems are being compromised so that criminals can sell minutes and leave the bill with the victim," Dhamankar says. Federal authorities broke up such a scam in June. (See Two Charged in VOIP Hacking Scandal.)

Dhamankar also expressed concern that attackers might use VOIP servers to inject bad messages into the public switched telephone network. "We haven't seen it happen yet, but with the interconnection of VOIP servers and traditional SS7 systems, it's possible," he says.

Another popular attacker target is the Web application, says Johannes Ulrich, CTO of the SANS Internet Storm Center. "Web applications have become an Achilles heel for a lot of enterprises," he says. "In many cases, the business is forced to keep its interfaces open, which leaves it exposed to attacks."

Attackers are targeting Web applications not only to steal data, but to use highly-trafficked Websites to launch other types of browser attacks, Ulrich observes. Other experts have pointed out that most enterprises still have a lot of work to do on Web application security. (See The Web App Security Gap.)

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...
PUBLISHED: 2021-01-26
A reflected XSS vulnerability exists in tohtml/convert.php of Winmail 6.5, which can cause JavaScript code to be executed.
PUBLISHED: 2021-01-26
A SSRF vulnerability exists in Winmail 6.5 in app.php in the key parameter when HTTPS is on. An attacker can use this vulnerability to cause the server to send a request to a specific URL. An attacker can modify the request header 'HOST' value to cause the server to send the request.
PUBLISHED: 2021-01-26
packages/wekan-ldap/server/ldap.js in Wekan before 4.87 can process connections even though they are not authorized by the Certification Authority trust store,