Security Boulevard (Original)

Attackers Weaponizing Zero-Days at Record Pace

Cybercriminals exploited a new remote code execution (RCE) zero-day, CVE-2021-40444, a week before a patch was released in September—that’s just one of the recent findings in a report by HP Wolf Security.

On September 10, researchers discovered scripts on GitHub that automated the creation of the exploit, which ostensibly means that even less-savvy attackers can use it in their malicious actions, according to the company’s Quarterly Threat Insights Report. That doesn’t bode well at a time when miscreants are exploiting zero-days faster and companies are taking longer to patch them—an average of 97 days, the report found.

“As the report notes, cybercriminals are weaponizing zero-day vulnerabilities at a speed never seen before,” said Archie Agarwal, founder and CEO at ThreatModeler. “One reason for this is that we’re in a vicious cycle due to the surge in ransomware.”

“We’ve seen a recent surge in exploits of zero-days, mainly because hackers are opportunistic and adapt very quickly to changing circumstances and new opportunities—leaving security teams struggling to keep up,” said Yaniv Bar-Dayan, CEO and co-founder at Vulcan Cyber.

“Zero-days can give these cybercriminals the opening they need in multiple attack vectors,” he said.

Agarwal noted that “companies are now paying substantial ransoms to decrypt their data, creating a lucrative feedback loop,” and the “faster criminals can weaponize, the more profit for them.”

In the particular exploit detailed by HP Wolf Security researchers, just one click on an attachment will initiate an attack. From there, cybercriminals install backdoors into systems, then sell access to ransomware operators. The scary part? Users don’t have to open the file nor must they enable macros for the attack to be successful.

Attackers also are operating more like businesses. “We’re now seeing criminal ransomware groups with VPs of product and organizational structures mirroring legitimate organizations,” said Agarwal. “They are professionalizing, and the more ransoms that are paid the more revenue they have available to employ skilled exploit coders and buy zero-days off the shelf.”

Other findings from the report showed cybercriminals’ relentless assault using email and demonstrated that security techniques aren’t foolproof. Most malware detected (89%) was delivered by email—web downloads account for the remaining 11%. And of the email malware that was isolated, 12% bypassed at least one gateway scanner.

Attackers favored archive files—they were used in 38% of isolated threats during the quarter reviewed. That’s more than double the 17% reported the quarter before.

The researchers detailed notable threats—chief among them attackers use of legitimate cloud services, as well as collaborative platforms like Discord, to host malware—that helps them sidestep whitelisting as well as intrusion detection systems.

“Cloud environments are not immune, and IT security teams must be proactive about improving cybersecurity hygiene and the overall enterprise security posture, as these threats are only going to grow more sophisticated and dangerous as bad actors get more experience under their belt,” said Bar-Dayan.

While Microsoft Office downloaders and binaries are being detected with some frequency, the researchers said, JavaScript malware campaigns are not. That gives attackers ample opportunity to spread remote access trojans, the researchers said.

Threat actors also found that evading detection is sometimes as simple as switching their preferred file type from Office documents to HTA files.

“Attackers will always find ways to find zero-day vulnerabilities and get inside the enterprise network via the front door,” said Vishal Jain, co-founder and CTO at Valtix. “This applies to both on-premises and public cloud environments.”

Key to “advanced cyberattacks are pingbacks to command and control sites once a foothold is established,” said Jain. “These infiltrations can exist for months on your network before they are discovered.“

Teri Robinson

From the time she was 10 years old and her father gave her an electric typewriter for Christmas, Teri Robinson knew she wanted to be a writer. What she didn’t know is how the path from graduate school at LSU, where she earned a Masters degree in Journalism, would lead her on a decades-long journey from her native Louisiana to Washington, D.C. and eventually to New York City where she established a thriving practice as a writer, editor, content specialist and consultant, covering cybersecurity, business and technology, finance, regulatory, policy and customer service, among other topics; contributed to a book on the first year of motherhood; penned award-winning screenplays; and filmed a series of short movies. Most recently, as the executive editor of SC Media, Teri helped transform a 30-year-old, well-respected brand into a digital powerhouse that delivers thought leadership, high-impact journalism and the most relevant, actionable information to an audience of cybersecurity professionals, policymakers and practitioners.

Recent Posts

Vulnerabilities for AI and ML Applications are Skyrocketing

In their haste to deploy LLM tools, organizations may overlook crucial security practices. The rise in threats like Remote Code…

2 hours ago

Cheap ‘Junk-Gun Ransomware’ Emerging on the Dark Web

Headlines about ransomware in recent years have focused on the most prolific gangs like LockBit, BlackCat, and Cl0p and the…

2 hours ago

USENIX Security ’23 – NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers

Authors/Presenters: *Yehuda Afek and Anat Bremler-Barr, Shani Stajnrod* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s…

4 hours ago

Randall Munroe’s XKCD ‘Eclipse Path Maps’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink

6 hours ago

What to Consider When Choosing a Software Composition Analysis (SCA) Tool

Given the widespread use of third-party components in application development, identifying and remediating code vulnerabilities as early in development as…

6 hours ago

House Passes Privacy-Preserving Bill, but Biden Blasts it

Are you a FANFSA fan? The White House isn’t. It says the bill “threatens national security.”

6 hours ago