Free Essay

Zero-Day Vulnerability

In:

Submitted By tinaeautiful
Words 1078
Pages 5
Software vulnerability

Chenestina Qiu

Networking 2

Period: 7

A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware, spyware or allowing unwanted access to user information. The term “zero day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users.
In order for the vendor to rectify the vulnerability, the software company must release a patch. Often patches are released on a regular basis, one example being Microsoft’s Patch Tuesday. On the second Tuesday of each month, Microsoft releases security fixes that resolve identified holes. If, however, a critical vulnerability is discovered, a patch may be released outside of schedule.

Browsers are similarly vulnerable; it’s a good idea to update your browser often, for updated security as well as features. To check if any updates are available for your browser of choice, open the browser and click either “Help” or the browser name, depending on which browser you’re using. A quick online search will provide step-by-step instructions. Alternately, you could set up automatic updates, again, depending on browser. Zero day vulnerabilities can be serious security risks. When searching for an appropriate antivirus solution, look for security software that protects against both known and unknown threats.

Just for a moment, think about the end game for an enterprise Chief Security Officer – it would be the day when all the systems are protected 24/7 from viruses, trojans, worms, and hackers stealing data or destroying it or launching denial of service or buffer-overflow attacks. The CSO ideally would like protection from all this without having to react very urgently in any case. Until that happens, enterprises would constantly buy various products that promise to achieve the desired levels of protection. Enterprises would love to be in a situation where they have Zero-Day protection, without having to jump out of bed and rush to office to update signatures or be on the phone trying to rectify an infected system. In short, they would prefer proactive protection that is “always on” rather than reactive protection that requires manual intervention.

There are a few trends that are driving the market towards proactive protection. The first is a gradual transition of the security market towards products that promise “intrusion prevention”. I use this term loosely since there are very few real intrusion prevention systems in the market today. Most security product vendors merely provide intrusion detection (IDS) with limited ability for automatic action. Considering the limited capacity to prevent attacks proactively, it is almost certain that IDS technology would almost surely be history in a very short period. Enterprises are increasingly looking for a reliable and comprehensive IPS package that can be trusted to stop the viruses rather than an alert about an intrusion into the network.

Intrusion prevention (IPS) technologies could be either network-based or host-based, and serve different purposes. In both models, the IPS is looking for known and unknown patterns of attacks including signatures, behavior anomalies, using rule-based engines that can learn “normal traffic” and recognize “abnormal traffic”. There already exist intrusion prevention systems that support gigabit networks with low latency in this newly maturing market.

The second trend is the commoditization of anti-virus software, and AV products on desktops and servers moving upwards in the value chain to include minimal desktop firewall and IPS characteristics. It is not far from the day when plain anti-virus products would cease to exist for enterprises and even consumers. The idea is to protect a system from multiple threats including viruses, buffer-overflow attacks, unwanted programs or spy-ware, block illegal access of servers and other such threats that target a system regardless of whether it is in an enterprise or at home.

One of the biggest challenges facing security teams today is staying up-to-date on the ever-changing security threat landscape. Cyber criminals now have access to a massive arsenal of zero-day vulnerabilities, and they are being sold on the open market to the highest bidder. And according to Verisign I Defense research, over 80% of those zero-day vulnerabilities detected are classified as “high severity.”

Knowing that the zero-day market place is thriving changes the dialogue from “zero-days are too rare and infrequent to spend time on,” to “they are already here and you might just not know it.” It’s no longer a question of if you will encounter zero-days, but how do you plan to locate, prioritize and remediate the ones already knocking on your door. The only defense is having advanced knowledge of exactly which attacks are most likely to be successfully launched against your environment and leveraging a risk-based prioritization method to shrink your attack surface.

Zero-day vulnerabilities, which are exploited in the wild and affect a widely used piece of software, are relatively rare; there were approximately eight in 2011. The past few months however has seen four such zero day vulnerabilities actively exploited in the wild. Two of the zero-day exploits were in Adobe Flash, the other two in Internet Explorer. In April 2012, we identified seven different Trojans that were being used in conjunction with CVE-2012-0779. Within one month, two more zero-day exploits were identified in the wild. These were CVE-2012-1875 and CVE- 2012-1889. The timing of the release of these three exploits was suspicious. As soon as one had been identified, the next became active. We investigated the three exploits and found connections between them all. In the past few weeks, yet another zero-day exploit was detected in the wild, CVE-2012-1535. We have tied this zero-day exploit back to all the others. They may only be the tip of the iceberg. In early 2010, Google documented an attack against their infrastructure. They stated that they were attacked in December 2009 and that the attacks originated in China. The attackers utilized a Trojan called Hydraq, (also known as Aurora), which was delivered using an Internet Explorer zero-day exploit. We believe the Hydraq attack.
References
https://www.kennasecurity.com www.pctools.com www.siliconindia.com

Similar Documents

Free Essay

Auditing and Compliance Lab 4

...1. What is a PHP Remote File Include (RFI) attack, and why are these prevalent in today's Internet world? RFI stands for Remote File Inclusion that allows the attacker to upload a custom coded/malicious file on a website or server using a script. This vulnerability exploits the poor validation checks in websites and can eventually lead to code execution on server or code execution on website (XSS attack using javascript). RFI is a common vulnerability and all website hacking is not entirely focused on SQL injection. Using RFI you can deface the websites, get access to the server and do almost anything. What makes it more dangerous is that you only need to have your common sense and basic knowledge of PHP to execute this one. 2. What country is the top host of SQL Injection and SQL Slammer infections? Why can't the US Government do anything to prevent these injection attacks and infections? The U.S. is the top host of SQL Injection and SQL Slammer infections. Cybercriminals have made vast improvements to their infrastructure over the last few years. Its expansion is thousands of websites vulnerable to SQL Injections. Malicious code writers have exploited these vulnerabilities to distribute malware so quick that the government cannot contain such a large quantity. 3. What does it mean to have a policy of Nondisclosure in an organization? It is a contract where the parties agree not to disclose information covered by the agreement. It outlines confidential material...

Words: 1109 - Pages: 5

Free Essay

Security

... What is the Threat Action? Please describe the difference between the two as well. Threat actor is a group using Hydraq (Aroura) Trojan horse they were named Elderwood gang Threat action happen when the attackers used nearly a dozen pieces of malware and several levels of encryption to burrow deeply into the bowels of company networks and infrastructure In simple way, we can say that threat actor is the person who does the attack while the threat action is how this attack assaults the system 2. What were the vulnerabilities that the Threat exercised? The most recent use exploits are : 1. Adobe Flash Player Object Type Confusion Remote Code Execution Vulnerability (CVE-2012-0779) 2. Microsoft Internet Explorer Same ID Property Remote Code Execution Vulnerability (CVE-2012-1875) 3. Microsoft XML Core Services Remote Code Execution Vulnerability (CVE-2012-1889) 4. Adobe Flash Player Remote Code Execution Vulnerability (CVE-2012-1535) The attackers gained access to the source code or reserve-engineered to those complied applications. Then use them to hit the targeted victim. 3. Was the attack on Confidentiality, Integrity, and/or Availability? Please provide an explanation for your response. I believe that this attack on confidentiality because the hackers had stolen intellectual property and sought access to the Gmail accounts of human rights activists and this leads to disclosure of data to non-authorized users so it violates...

Words: 671 - Pages: 3

Premium Essay

Security Policy Outline

...and observed. The following outline shows the strategies taken to mitigate risks, threats and vulnerabilities. This outline is subject to change at any time if the situation arises that new risks and threats are revealed. This outline will be subjected to monthly auditing to ensure the highest level of security. The layers of security that will be covered are as follows: 1. User Domain 2. Workstation Domain 3. LAN (Local Area Network) Domain 4. LAN-to-WAN (Wide Area Network) Domain 5. WAN Domain (Internet and Connectivity) 6. Remote Access Domain 7. System/Application Domain 1. User Domain a) Conduct security training for new associates and vendors who are being allowed onto the network. b) Develop an Acceptable Use Policy (AUP) c) Auditing of user activities on company assets 2. Workstation Domain a) Disable peripheral devices such as USB’s and CD’s from being used at workstations b) Enable password protection. Require passwords to meet complexity standards. c) Enable automatic antivirus scans d) Enable content filtering 3. LAN Domain a) Ensure wiring closets and data centers are properly secured, with access being limited to associates and vendors who are required to be in them. b) Enable second-level identity checks for access to sensitive systems and programs c) Define a strict software vulnerability policy requiring quick software patching d) Require network keys for Wireless LAN access 4...

Words: 585 - Pages: 3

Free Essay

Is4560

...Internet Security Threat Report released in 2010 there was over 286 million security threats that plagued PC users. There was a 93% increase in web attacks and 6,258 new vulnerabilities identified. Based on this report there were 5 major threats that plagued PC users. One major threat was targeted attacks known as Stuxnet. Stuxnet includes exploit code that uses a number of zero-day vulnerabilities. Targeted attacks are increasing in number and are not limited to high-level employees. Rather, lower-level employees are being targeted in greater numbers. All the attacker needs is a negligent user or a computer that has not been updated with the latest security patches. Web-based attacks, which typically involve techniques that redirect the browser to malicioussites, were the most commonly reported type of attack. Web-based attacks represented 26% ofdetections, followed by theConfickerworm with 20%. Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attacker’s toinjectclient-side scriptintoWeb pagesviewed by other users. A cross-site scripting vulnerability may be used by attacker’s to by pass access controls such as the same origin policy. Cross-site scripting carried out on websitesaccounted for roughly 84% of all security vulnerabilities documented bySymantec.Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to...

Words: 270 - Pages: 2

Premium Essay

Hw Lab

...1. What is the main difference between a virus and a Trojan? A virus is a program that is capable of replicating with little or no user intervention, and the replicated programs also replicate further. There is typically a piece of code that causes an unexpected, usually malicious, event (payload) to occur. Viruses are often disguised as games or images with clever marketing titles. A Trojan horse is a program that either pretends to have, or is described as having, a set of useful or desirable features, but actually contains a damaging payload. True Trojan horses are not technically viruses, since they do not replicate, however many viruses and worms use Trojan horse tactics to infiltrate a system. Although Trojans are not technically viruses, they can be just as destructive. 2. A virus or malware can impact which of the three tenets of information systems security (CIA)? Describe how it impacts it as well. Virus maybe can send files to other people that don’t allow reading these files. It will affect Confidentiality. Some virus will break program. Then these programs cannot run. This wills effect Availability. Some virus will change some file in a program. This wills effect Integrity. 3. Once a malicious file is found on your computer, what are the default settings for USB/removable device scanning? What should an organization do regarding use of USB hard drives and slots on existing computers and devices? Besides Vendor IDs and Product IDs, some devices also have...

Words: 1736 - Pages: 7

Premium Essay

Nt1310 Unit 5 Assignment 1

...It is called a "zero-day" because the programmer has had zero days to fix the flaw (in other words, a patch is not available)”. [7] Stuxnet exploited a printer spooler vulnerability, a .LNK vulnerability along with vulnerabilities in the Task Scheduler files and Windows Keyboard file to elevate its privileges to fully control the system. Finally, the worm also took advantage of the static password that Siemens had hard coded into the Step7 software to gain access to the database server. Once this information was discovered it was immediately believed that Stuxnet was the work of a nation-state or nation-states as experts said no hacker would expend such valuable information in his manner. “Zero Day” vulnerabilities are extremely rare and valuable entities. Four “Zero Days” in one worm would be considered reckless wastage in the hacker...

Words: 654 - Pages: 3

Free Essay

Top Security Threats

...Top Security Threats Craig Gagne’ IS317: Hacker Techniques Tools and Incident Handling 12/15/2013 Hany Othman The report highlights dramatic increases in targeted attacks on enterprises; the continued growth of social networking sites as an attack distribution platform; and a change in attackers’ infection tactics, increasingly targeting vulnerabilities in Java to break into traditional computer systems. In addition, the report explores how attackers are exhibiting a notable shift in focus toward mobile devices. Targeted attacks Targeted attacks such as Hydraq and Stuxnet posed a growing threat to enterprises in 2010. To increase the likelihood of successful, undetected infiltration into the enterprise, an increasing number of these targeted attacks leveraged zero-day vulnerabilities to break into computer systems. Stuxnet and Hydraq teach future attackers that the easiest vulnerability to exploit is our trust of friends and colleagues. Stuxnet could not have breached its target without someone being given trusted access with a USB key. Meanwhile, Hydraq would not have been successful without convincing users that the links and attachments they received in an email were from a trusted source. Social Networks Social network platforms continue to grow in popularity and this popularity has not surprisingly attracted a large volume of malware. One of the primary attack techniques used on social networking sites involved the use of shortened...

Words: 727 - Pages: 3

Premium Essay

No Paper

... In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw.[1] To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities.[2] This practice generally refers to software vulnerabilities in computing systems. A security risk may be classified as a vulnerability. The use of vulnerability with the same meaning of risk can lead to confusion. The risk is tied to the potential of a significant loss. Then there are vulnerabilities without risk: for example when the affected asset has no value. A vulnerability with one or more known instances of working and fully implemented attacks is classified as an exploitable vulnerability — a vulnerability for which an exploit exists. The window of vulnerability is the time from when the security hole was introduced or manifested in deployed software, to when access was removed, a security fix was available/deployed, or the attacker was disabled—see zero-day attack. Security bug (security defect) is a narrower concept: there are vulnerabilities that are not related to software:...

Words: 741 - Pages: 3

Premium Essay

Stuxnet Worm

...plagiarism or self-plagiarism. I have cited all sources from which I used data, ideas, or words either quoted or paraphrased. Abstract Discovered in June of 2010, a computer worm called Stuxnet was designed to attack programmable-logic controllers or PLCs that are used to control switches and values in industries that operate a specific type of on Siemens PLC device using Step7 software running on a Windows operating system. The worm was successful because it was able to exploit a of four zero-day flaw of Windows operating system. Stuxnet was a targeted attack by intelligence agencies to delay the enrichment of uranium by Iran. The Stuxnet worm was the first clear public evidence of sophisticated computer malware to sabotage control systems. The Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges in 2010. Table of Contents Introduction 5 Stuxnet Worm 5 Stuxnet is a Computer Virus 5 How Stuxnet Works 7 Stuxnet and PLCs 9 Stuxnet: Cyber Warfare? 9 Zero-day flaws and Stuxnet 11 Summary 12 References 14 Table of Figures Figure 1: SIEMINS S7 family of PLC (SIEMINS, n.d) 5 Figure 2: Flash Drive 5 Figure 3: Realtek Semiconductor Corp Logo (RealTek, n.d.). 6 Figure 4: Realtek Certificate (Symantec, 2010). 6 Figure 5: How STUXNET Spreads (New York Times, 2011). 7 Figure 6: Infection By Country (Symantec, 2010). 9 Figure 7: WinCC Software (Symantec, 2010). 11 Introduction Discovered in June of 2010, a computer worm called...

Words: 2136 - Pages: 9

Free Essay

Lab2

...in time, Stuxnet may be forgotten as well, their influence will be felt in malware attacks to come. Stuxnet and Hydraq teach future attackers that the easiest vulnerability to exploit is our trust of friends and colleagues. Stuxnet could not have breached its target without someone being given trusted access with a USB key. Meanwhile, Hydraq would not have been successful without convincing users that the links and attachments they received in an email were from a trusted source. Social networks. Whether the attacker is targeting a CEO or a member of the QA staff, the internet and social networks provide rich research for tailoring an attack. By sneaking in among our friends, hackers can learn our interests, gain our trust, and convincingly masquerade as friends. Long gone are the days of strange email addresses, bad grammar, and obviously malicious links. A well-executed social engineering attack has become almost impossible to spot. Zero-day vulnerabilities and rootkits. Once inside an organization, a targeted attack attempts to avoid detection until its objective is met. Exploiting zero-day vulnerabilities is one part of keeping an attack stealthy since these enable attackers to get malicious applications installed on a computer without the user’s knowledge. in 2010, 14 such vulnerabilities were discovered. Rootkits also play a role. While rootkits are not a new concept, techniques continue to be refined and redeveloped as attackers strive to stay...

Words: 548 - Pages: 3

Premium Essay

Is3110T Lab 2 Assessment Worksheet

...Lab #2 Assessment Worksheet Align Risks, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls 1. a. Unauthorized access from public internet - HIGH b. User destroys data in application and deletes all files - LOW c. Workstation OS has a known software vulnerability – HIGH d. Communication circuit outages - MEDIUM e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization owned computers - MEDIUM 2. a. PO9.3 Event Identification – Identify threats with potential negative impact on the enterprise, including business, regulatory, legal, technology, trading partner, human resources and operational aspects. b. PO9.4 Risk Assessment – Assess the likelihood and impact of risks, using qualitative and quantitative methods. c. PO9.5 Risk Response – Develop a response designed to mitigate exposure to each risk – Identify risk strategies such as avoidance, reduction, acceptance – determine associated responsibilities; and consider risk tolerance levels. 3. a. Unauthorized access from public internet - AVAILABILITY b. User destroys data in application and deletes all files - INTEGRITY c. Workstation OS has a known software vulnerability – CONFIDENTIALITY d. Communication circuit outages - AVAILABILITY e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization owned computers - INTEGRITY 4. a. Unauthorized access from public internet...

Words: 934 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment 1

...use, with breathtaking speed that it is almost impossible to identify something that does not rely on it. This increased dependency on technology does have limits, though, when analyzing for security to protect users from malicious actors who will attempt to exploit vulnerabilities to access data and information. With incredible amounts of information that is electronically accessible,...

Words: 1263 - Pages: 6

Premium Essay

Cmgt 410 Week 2 Individual

...Protecting information and all assets is critical in today’s time. The military faces three major types of threats: Employees, Zero-Day Exploits, and Cyber Espionage. It is imperative, due to the information and assets on-hand, that the military mitigates these risks. The first major threat, employees, is a very common threat to all organizations. Employees can be broken down into three types of threats which include, employees that are careless and untrained, employees that are tricked or fall prey to social engineering, and employees with malicious intentions. This will always be a potential threat because every organization requires employees to run and function. Protecting a network and data should be top priority for every organization. With policies, procedures, and training implemented, employees will have a better understanding of what is allowed on their organization’s network, how to properly navigate the system, and how to safeguard all information contained within the network. Policies and procedures also inform employees of what practices are in the event information is disclosed without authorization and any and all penalties that may go along with them. Having this information readily available to employees ensures they are aware the organization is serious about protecting all assets and information and will enforce legal action if needed. Since employees are the individuals that have access to all information, some of which is sensitive, they need to understand...

Words: 1178 - Pages: 5

Premium Essay

Operating System Security Flaws

...defined by the dictionary is being capable of or susceptible to being hurt or wounded by a weapon. In computer science, to be vulnerable means to be open to attack. Vulnerability in a computer’s system is a weakness and this weakness can be preyed on by attackers to take advantage of the system’s private data. In using a system, we are assured that the data we input is stored securely and processed for the intended purpose only. So the susceptibility of the system, the attacker’s access to this flaw and the capability to exploit this flaw compose the elements of computer vulnerability. For this flaw to be exploited, the attacker must have an attack surface, meaning the attacker must have some technique or tool to exploit the system. One classification of a vulnerability is security bug or defect, where a firewall may be out of date or in this case, Windows Defender is significantly out of date leaving the system with a window of vulnerability to attacks. This window would be from when the bug was discovered, access was removed, a fix was available and if or when an attack was disabled. Windows Defender was designed as a free software to defend against unwanted attacks as a combination of Microsoft Security essentials. With proper security patch updating, Windows should have minimal security bug and any other vulnerabilities present in the system. It is still recommended to have some additional Antivirus program depending on the daily use of the system. This means that if the user...

Words: 986 - Pages: 4

Premium Essay

Lab 12

...1. What is a PHP Remote File Include (RFI) attack, and why are these prevalent in today’s Internet world? RFI stands for Remote File Inclusion that allows the attacker to upload a custom coded/malicious file on a website or server using a script. This vulnerability exploits the poor validation checks in websites and can eventually lead to code execution on server or code execution on website (XSS attack using javascript). RFI is a common vulnerability and all website hacking is not entirely focused on SQL injection. Using RFI you can deface the websites, get access to the server and do almost anything. What makes it more dangerous is that you only need to have your common sense and basic knowledge of PHP to execute this one 2. What country is the top host of Structured Query Language (SQL) injection and SQL Slammer infections? Why can’t the U.S. government do anything to prevent these injection attacks and infections? The U.S. is the top host of SQL Injection and SQL Slammer infections. Cybercriminals have made vast improvements to their infrastructure over the last few years. Its expansion is thousands of websites vulnerable to SQL Injections. Malicious code writers have exploited these vulnerabilities to distribute malware so quick that the government cannot contain such a large quantity. 3. What does it mean to have a policy of nondisclosure in an organization? It is a contract where the parties agree not to disclose information covered by the agreement. It...

Words: 411 - Pages: 2