Concealing the vulnerabilities allows hackers to 10 months to use them

Posted: October 25, 2012 in IT Security News
Tags: , , ,

Symantec CorpSymantec has conducted investigation into the attacks of “zero-day” (zero-day attack), received discouraging results: on average, hackers are able to unauthorized use of unknown vulnerabilities in a wide range of over 312 days or 10 months. Furthermore, the number and severity of these attacks in recent times only grow.

Exploit “zero day”, as the combination of a vulnerability, is not widely publicized, and the tools to exploit this vulnerability, an attacker in order to have great value for cybercriminals. Once the vulnerability becomes generally known, developers, and system administrators are beginning to work actively to block or neutralize the threat, then the next exploit “zero day” becomes almost useless to cybercriminals.

Leyla Bilge Damitras and Tudor Dumitras research division of Symantec Research Labs studied 18 attacks “zero day” found in the period from 2008 to 2011, with 11 of them have been identified and studied for the first time. According to the study, in general attack of “zero-day” lasts 312 days, and after the announcement of the vulnerability that is targeted for this attack, the number of exploits increased a thousandfold.

It should be noted that the data for the study were collected from clients Symantec, who have agreed to use the remote control virus. Results of the study were presented at the ACM Conference on Computer and Communications Security.

Links:

https://malwarelist.net/2012/10/19/0day-exploits/

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s