Crims prefer old exploits: Microsoft

Zero-day threat is overrated


While media around the world are excited by the announcement of every new zero-day vulnerabilities, attackers yawn, according to Microsoft.

Presenting Volume 11 of its Security Intelligence Report at the RSA Conference in Europe on October 11, Microsoft pointed out that less than one percent of the attacks its report identified were trying to exploit zero-day vulnerabilities.

The report finds that most malware propagates through user interaction – in short, getting users to fail the malware IQ test and click on a malicious link or application – while more than one-third of malware exploits Win32/Autorun on the insertion of media like USB keys.

Moreover, the research finds that 90 percent of infections exploited a vulnerability for which a patch had been available for more than a year. This is well in line with research from Australia’s Defence Signals Directorate, which in July identified application and operating system patching as two of the four most important attack mitigation strategies available to IT managers.

Interestingly, given the general belief that the world is in the midst of a malware apocalypse, the report also finds encouraging trends in the first half of this year. “Medium and high severity vulnerabilities disclosed in 1H11 were down 6.8 percent and 4.4 percent from 2H10, respectively,” the report notes, while “low complexity vulnerabilities – the easiest ones to exploit – were down 41.2 percent from the prior 12-month period.”

Java exploits – including JRE, JVM and JDK vulnerabilities – dominate the landscape, while the CV-2010-2568 vulnerability (used by the Stuxnet family) drove an increase in operating system-level exploits, the report states. The report also observed nearly a million Acrobat and Adobe Reader document format exploits, nearly all of which involved the Win32/Pdfjsc exploit family.

Vinny Gullotto, general manager of the Microsoft Malware Protection Center, told the RSA Conference the data in the report “helps remind us that we can’t forget the basics.

“Techniques such as exploiting old vulnerabilities, Win32/Autorun abuse, password cracking and social engineering remain lucrative approaches for criminals.”

Phishers seem to be shifting their tactics as well, from their older preference for financial sites to targeting social media sites, which got 83.8 percent of malicious page impressions in April, the report finds.

“Overall, impressions that targeted social networks accounted for 47.8 percent of all impressions in 1H11, followed those that targeted financial institutions at 35.0 percent,” the report says. ®

Similar topics


Other stories you might like

  • CISA and friends raise alarm on critical flaws in industrial equipment, infrastructure
    Nearly 60 holes found affecting 'more than 30,000' machines worldwide

    Updated Fifty-six vulnerabilities – some deemed critical – have been found in industrial operational technology (OT) systems from ten global manufacturers including Honeywell, Ericsson, Motorola, and Siemens, putting more than 30,000 devices worldwide at risk, according to private security researchers. 

    Some of these vulnerabilities received CVSS severity scores as high as 9.8 out of 10. That is particularly bad, considering these devices are used in critical infrastructure across the oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining and building and automation industries. 

    The most serious security flaws include remote code execution (RCE) and firmware vulnerabilities. If exploited, these holes could potentially allow miscreants to shut down electrical and water systems, disrupt the food supply, change the ratio of ingredients to result in toxic mixtures, and … OK, you get the idea.

    Continue reading
  • Inside the RSAC expo: Buzzword bingo and the bear in the room
    We mingle with the vendors so you don't have to

    RSA Conference Your humble vulture never liked conference expos – even before finding myself on the show floor during a global pandemic. Expo halls are a necessary evil that are predominatly visited to find gifts to bring home to the kids. 

    Do organizations really choose security vendors based on a booth? The whole expo hall idea seems like an outdated business model – for the vendors, anyway. Although the same argument could be made for conferences in general.

    For the most part, all of the executives and security researchers set up shop offsite – either in swanky hotels and shared office space (for the big-wigs) or at charming outdoor chess tables in Yerba Buena Gardens. Many of them said they avoided the expo altogether.

    Continue reading
  • Emotet malware gang re-emerges with Chrome-based credit card heistware
    Crimeware groups are re-inventing themselves

    The criminals behind the Emotet botnet – which rose to fame as a banking trojan before evolving into spamming and malware delivery – are now using it to target credit card information stored in the Chrome web browser.

    Once the data – including the user's name, the card's numbers and expiration information – is exfiltrated, the malware will send it to command-and-control (C2) servers that are different than the one that the card stealer module uses, according to researchers with cybersecurity vendor Proofpoint's Threat Insight team.

    The new card information module is the latest illustration of Emotet's Lazarus-like return. It's been more than a year since Europol and law enforcement from countries including the United States, the UK and Ukraine tore down the Emotet actors' infrastructure in January 2021 and – they hoped – put the malware threat to rest.

    Continue reading
  • 1Password's Insights tool to help admins monitor users' security practices
    Find the clown who chose 'password' as a password and make things right

    1Password, the Toronto-based maker of the identically named password manager, is adding a security analysis and advice tool called Insights from 1Password to its business-oriented product.

    Available to 1Password Business customers, Insights takes the form of a menu addition to the right-hand column of the application window. Clicking on the "Insights" option presents a dashboard for checking on data breaches, password health, and team usage of 1Password throughout an organization.

    "We designed Insights from 1Password to give IT and security admins broader visibility into potential security risks so businesses improve their understanding of the threats posed by employee behavior, and have clear steps to mitigate those issues," said Jeff Shiner, CEO of 1Password, in a statement.

    Continue reading

Biting the hand that feeds IT © 1998–2022