Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

Zero-Days Top 2006 Attack List

Attackers' fondest desire is to develop an exploit that hasn't been patched yet, experts say

"Zero day" was the mantra for attackers in 2006, and the trend shows no signs of letting up next year, according to a new report issued by The SANS Institute earlier today.

In its annual, in-depth study of the Internet's most popular online exploits, the security research and training organization found that zero-day attacks have skyrocketed over the past year.

"In 2006, we've seen a significant rise in attacks that take advantage of zero-day vulnerabilities, leaving a user or system unable to defend against the attack, since there is no patch available," says Marc Sachs, director of the SANS Internet Storm Center and SRI International.

The interest in zero-day exploits is increasing as companies and end users improve their patch management, says Rohit Dahmankar, senior manager of security research at TippingPoint Technologies Inc. "As automated patch management has emerged, we've seen greater interest in zero-day attacks," he says.

Microsoft Corp. (Nasdaq: MSFT) applications, particularly Office programs such as Excel and PowerPoint, are a key target for these attacks, Sachs says. Such application-level attacks often circumvent traditional security defenses such as firewalls and IDSs, and usually aren't handled by antivirus tools. "This fact is well known to the criminal and espionage communities, and is one of the key reasons for the rapid growth of this attack methodology," says Dahmankar.

Qualys Inc. , a security vendor that has been tracking attacks on the Microsoft suite, has seen a threefold increase in instances of attacks on those applications in the last year, according to Amol Sarwate, manager of Qualys's Vulnerability Management Lab. "About 20 percent of those attacks were zero-day," he says.

Many of the zero-day attacks on Windows applications are initiated in China, according to Sachs. The country's lax position on intellectual property rights makes it relatively easy for attackers to get access to Microsoft source code, and there are few law enforcement agencies investigating such attacks on other countries, he observes.

Attacks on U.S. military and government sites are also on the rise, according to the SANS Institute report. A U.S. Air Force general recently conceded that "petabytes" of its data had been stolen by foreign governments, and that the Department of Commerce recently announced plans to replace hundreds of computers because of security vulnerabilities, according to Alan Paller, director of research for the Institute.

Voice over IP technology has also become a popular target for attackers, the SANS experts say. "The FBI reports that many VOIP systems are being compromised so that criminals can sell minutes and leave the bill with the victim," Dhamankar says. Federal authorities broke up such a scam in June. (See Two Charged in VOIP Hacking Scandal.)

Dhamankar also expressed concern that attackers might use VOIP servers to inject bad messages into the public switched telephone network. "We haven't seen it happen yet, but with the interconnection of VOIP servers and traditional SS7 systems, it's possible," he says.

Another popular attacker target is the Web application, says Johannes Ulrich, CTO of the SANS Internet Storm Center. "Web applications have become an Achilles heel for a lot of enterprises," he says. "In many cases, the business is forced to keep its interfaces open, which leaves it exposed to attacks."

Attackers are targeting Web applications not only to steal data, but to use highly-trafficked Websites to launch other types of browser attacks, Ulrich observes. Other experts have pointed out that most enterprises still have a lot of work to do on Web application security. (See The Web App Security Gap.)

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17660
PUBLISHED: 2019-10-16
A cross-site scripting (XSS) vulnerability in admin/translate/translateheader_view.php in LimeSurvey 3.19.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the tolang parameter, as demonstrated by the index.php/admin/translate/sa/index/surveyid/336819/lang/ PATH_INFO.
CVE-2019-11281
PUBLISHED: 2019-10-16
Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input...
CVE-2019-16521
PUBLISHED: 2019-10-16
The broken-link-checker plugin through 1.11.8 for WordPress (aka Broken Link Checker) is susceptible to Reflected XSS due to improper encoding and insertion of an HTTP GET parameter into HTML. The filter function on the page listing all detected broken links can be exploited by providing an XSS payl...
CVE-2019-16522
PUBLISHED: 2019-10-16
The eu-cookie-law plugin through 3.0.6 for WordPress (aka EU Cookie Law (GDPR)) is susceptible to Stored XSS due to improper encoding of several configuration options in the admin area and the displayed cookie consent message. This affects Font Color, Background Color, and the Disable Cookie text. A...
CVE-2019-16523
PUBLISHED: 2019-10-16
The events-manager plugin through 5.9.5 for WordPress (aka Events Manager) is susceptible to Stored XSS due to improper encoding and insertion of data provided to the attribute map_style of shortcodes (locations_map and events_map) provided by the plugin.