TechBizWebTechBizWeb

    Subscribe to Updates

    Get the latest news about Technology and Business from all around the web..

    What's Hot

    Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

    November 7, 2022

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022
    Facebook Twitter Instagram
    • About Us
    • Privacy Policy
    • Guest Post
    • Terms
    • Contact
    Facebook Twitter Instagram
    TechBizWebTechBizWeb
    Subscribe
    • Home
    • Technology

      Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

      November 7, 2022

      Devialet brings its sci-fi design aesthetics to a $790 portable speaker

      November 7, 2022

      Elon Musk’s response to fake verified Elon Twitter accounts: a new permanent ban policy for impersonation

      November 7, 2022

      The iPhone 14 Pro and Pro Max will come with ‘longer wait times’ due to factory lockdown

      November 6, 2022

      Meta’s reportedly planning to lay off ‘thousands’ of workers this week

      November 6, 2022
    • Business
    • Cyber Security
      National Security News

      List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

      September 24, 2022

      Cybersecurity ranked most serious enterprise risk in 2022

      August 31, 2022

      Registration open for CISA virtual summit on K-12 school safety

      August 31, 2022

      What do the Trickbot leaks reveal about Russian cybercrime?

      August 31, 2022

      What cybersecurity measures do CISOs outsource?

      August 30, 2022
    • Blockchain
    • Vulnerabilities
    • Social Engineering
    • Malware
    • Cyber Security Alerts
    TechBizWebTechBizWeb
    Home»Cyber Security»Microsoft Dominates 2018’s Most Exploited Vulnerabilities
    Cyber Security

    Microsoft Dominates 2018’s Most Exploited Vulnerabilities

    March 19, 2019Updated:March 19, 2019No Comments5 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Eight of the top ten most exploited vulnerabilities in 2018 affected Microsoft products. Only one — but the second most exploited — was an Adobe vulnerability. The last one, ranking at the ninth most exploited vulnerability of 2018, was an Android vulnerability.

    These details come from Recorded Future’s Cyber Threat Analysis of vulnerabilities exploited throughout 2018. The intelligence comes from thousands of different resources, including code repositories, deep web forum postings and dark web onion sites. The purpose is to provide a missing link in today’s risk analysis. Vulnerability databases provide information about vulnerabilities, but do not disclose whether or to what extent each one is being actively exploited.

    It is worth noting that some of the best-known vulnerabilities, such as those exploited by EternalBlue and Specter/Meltdown, don’t make the list. This is because they tended to be used by a limited number of nation states rather than a large number of criminals. “The ETERNALBLUE exploit (which used MS17-010),” notes the report, “while often mentioned, was not used by the criminal underground or offered for sale as a part of other exploit kits. Spectre, while noted in a few phishing attacks, was not also heavily utilized by under criminals.”

    By knowing which threats are most active, security teams can prioritize which systems most urgently need patching or other mitigating actions. In a 2017 analysis of zero-day threats, RAND Corporation pointed out that vulnerabilities on average have a seven-year life-cycle. The most exploited vulnerabilities from 2018 will almost certainly still be exploited in 2019.

    For example, the most exploited vulnerability in 2017 (CVE-2017-0199) was still the fifth most exploited vulnerability in 2018. The most exploited vulnerability of 2016 (CVE-2016-0189) was still the sixth most exploited in 2018, being used by five different exploit kits. And the oldest vulnerability in the list dates from 2012, and is still present in EKs today.

    Recorded Future’s analysis also looked at exploit kits (EKs) and remote access trojans (RATs). In both cases, the decline in new development is continuing. In 2017, there were ten new EKs. In 2018, this had dropped to five new EKs. The most-referenced EK on the dark web was Threadkit (which first emerged in 2017). Threadkit contains four of the 2018 top ten Microsoft vulnerabilities (CVE-2018-4878, CVE-2017-11882, CVE-2017-0199, and CVE-2017-8570), and was selling for $400 in December 2018. It was last updated on December 28 by mrbass, a user on a dark web forum, to include vulnerability CVE-2018-15982. This is an Adobe vulnerability too recent to make the top ten for the whole year.

    The only two ransomwares highlighted in this report are Gandcrab and Hermes. Gandcrab is delivered by the Fallout and Grandsoft EKs — which is fairly typical of consumer targeted ransomware. Recent reports have suggested that GandCrab is increasingly being targeted against businesses. Interestingly, a new report from BitDefender says that North Korean “hackers are targeting the websites of [Chinese] government departments with emails containing [GandCrab] ransomware.” The attribution, however, is limited to a North Korean name in the email header — which seems a somewhat flimsy. Hermes is being delivered via the Adobe vulnerability.

    In 2017, there were 47 new RATs, but only 35 in 2018.

    Allan Liska, Recorded Future’s threat intelligence analyst, told SecurityWeek that the shift away from EK’s is likely linked to the growth of targeted attacks. He doesn’t believe, however, that this indicates a growth in sophisticated criminals over script kiddies (who traditionally bought or hired EKs). “The growth of cybercrime as a service now makes it easy for less tech-savvy criminals to launch targeted attacks.” However, he added, “a second reason for the decline in EK usage is that they are getting less effective. They are primarily used in browsers, and there are fewer browser exploits available. The few EKs that remain very effective are being used more than others, simply because they still work.” 

    Use of Adobe vulnerabilities continued its decline in 2018. In 2015 and 2016, the majority of most-used vulnerabilities were Adobe vulnerabilities — in 2018 there was just one in the top ten. Recorded Future believes this is likely down to the impending demise of Adobe Flash in 2020 — but note the emergence of CVE-2018-15982 at the end of 2018 and its inclusion in the Threadkit (also added to Fallout) EK in January 2019.

    The report makes a few specific recommendations for security teams. Top of the list, unsurprisingly, is “Prioritize patching of all the vulnerabilities identified in this post.” Most of the remaining advice is fairly standard ‘good practice’; but two suggestions stand out as slightly unusual: consider using the Chrome browser; and employ an ad-blocker.

    “Right now,” explained Liska, “the Chrome track record is pretty good. Every browser has exploits. They are one of the most, if not the most, targeted pieces of software. What we’ve seen is that Chrome is quick to patch any new vulnerabilities and all versions have the auto-update feature, so they get updated relatively quickly. There aren’t many unpatched versions of Chrome around, and Google has built in a number of additional protections. When vulnerabilities are found in Chrome, our research suggests that they are difficult to exploit. So, purely from a security perspective, Chrome is an excellent browser choice.”

    The second most frequently exploited vulnerability, the Adobe vulnerability, is primarily delivered through malvertising — and malvertising is a perennial and largely invisible threat.

    Related: The Top Vulnerabilities Exploited by Cybercriminals

    Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

    Previous Columns by Kevin Townsend:
    Tags:



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    National Security News

    List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

    September 24, 2022 Cyber Security

    Cybersecurity ranked most serious enterprise risk in 2022

    August 31, 2022 Cyber Security

    Registration open for CISA virtual summit on K-12 school safety

    August 31, 2022 Cyber Security

    What do the Trickbot leaks reveal about Russian cybercrime?

    August 31, 2022 Cyber Security

    What cybersecurity measures do CISOs outsource?

    August 30, 2022 Cyber Security

    SIA announces Women in Security Forum scholarship recipients

    August 30, 2022 Cyber Security
    Editors Picks

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022

    Google Cloud Says Running Validator on Solana Blockchain

    November 7, 2022

    European stocks rise as investors boosted by China speculation

    November 7, 2022
    Trending Now

    Evergrande creditors sell ‘Versailles mansion’ plot in Hong Kong

    By techbizweb

    OpenSea Creates Tool for NFT Creators to Enforce Royalties On-Chain

    By techbizweb

    FTSE chairs warn of declining relations with institutional investors

    By techbizweb

    https://www.nationalsportsacademy.com

    slot gacor hari ini

    http://www.inadesfo.org/

    http://www.eueomgbissau.org/

    http://www.congo-mai-mai.net/

    http://www.angelesdelafrontera.org/

    http://fifaworldcup2018schedule.com/

    http://tony4gtrmcr.co.uk/

    http://www.standrewsagreement.org/

    http://www.bob-russell.co.uk/

    http://davidmulholland.co.uk/

    http://railwayhotelenniskillen.com/

    http://www.fantasysportstrades.com/

    http://www.rainleaf-flooring.com

    http://mothersagainstguns.org/

    http://ma-coc.org/

    slot online

    http://www.paradoxmag.com/situs-judi-slot-online-gampang-menang-2021/

    http://www.paradoxmag.com/situs-judi-slot-online-terbaru-2021/

    http://slot-terbaru.net/

    Slot Gacor

    Slot Online

    Situs Slot Gacor

    http://www.appdexterity.com/

    https://cars4kids-deutschland.de/

    https://www.stretchingculture.com/

    https://www.b-123-hp.com/slot-gacor/

    https://denzstaffing.nl/

    https://ezbbqcooking.com/slot-gacor/

    https://www.mbahelp24.com/slot-gacor

    https://minhtanstore.com/slot-jackpot-terbesar/

    https://njbpusupplierdiversity.com/slot-gacor-gampang-menang/

    https://www.floridaspecialtycropfoundation.org/slot-gampang-menang/

    https://childrenscornerpreschool.org/slot-gacor-gampang-menang/

    https://cryptoquoter.com/slot-online-terbaik/

    https://alorkantho24.com/slot-gacor/

    https://ellas.xyz/slot-gacor/

    https://it.dougamatome.xyz/slot-online/

    https://www.daltercume.com/slot-gacor/

    https://josi-ana.dougamatome.xyz/slot88/

    https://josi-ana.dougamatome.xyz/slot-gacor/

    https://fastobserver.com/slot-jackpot-terbesar/

    https://www.planetexperts.com/slot-gacor/

    https://bfsolution.group/slot-bet-kecil/

    https://rustleva.co/slot/

    https://bfsolution.group/slot-bet-kecil/

    https://www.hotelcalimareal.com/togel-online/

    https://anime-game.dougamatome.xyz/slot-gacor-gampang-menang/

    https://anime-game.dougamatome.xyz/togel-online/

    https://bourbonbarrelfoods.com/slot/

    http://suneo39.wp.xdomain.jp/slot/

    https://techbizweb.com/slot-gacor/

    https://www.generalcatalyst.com/18-daftar-slot-gacor-terbaik-gampang-menang-jackpot-hari-ini/

    https://www.hotelcalimareal.com/slot-online/

    https://www.blockgates.io/slot-gacor/

    https://l12.com.br/slot-gacor/

    slot paling gacor

    https://www.donalds-hobby.com/slot-online/

    https://thecryptodirt.com/slot-gacor-hari-ini/

    http://iseta.edu.ar/aulavirtual/app/upload/users/1/1205/my_files/sbobet.html

    http://escuelavirtual.mincit.gov.co/app/upload/users/1/194/my_files/slot.html

    https://www.dev.medecinesfax.org/courses/JUDICASINO/document/slot.html

    http://www.e-archivos.org/cursos/courses/JUDICASINO/document/slot-gacor.html

    http://iesma.com.br/ead/main/upload/users/4/447/my_files/slot.html

    https://www.fundacoop.org/chamilo/app/upload/users/1/1185/my_files/slot.html

    https://fata-aatf.org/eskola/main/upload/users/3/31/my_files/slot.html

    https://uancv.edu.pe/ofinvestigacion/app/upload/users/3/328/my_files/slot-terlengkap.html

    https://micost.edu.my/EL/app/upload/users/2/209/my_files/slot-gacor.html

    https://www.academiacoderdojo.ro/elearningdev/app/upload/users/2/2442/my_files/slot-online.html

    http://campus-cidci.ulg.ac.be/courses/JUDICASINO/document/slot-termurah.html

    https://www.escueladerobotica.misiones.gob.ar/aula-ste/courses/LIVECASINO/document/slot-tergacor.html

    http://ccdipeepccqqfar.usac.edu.gt/chamilo/app/upload/users/3/358/my_files/slot-online.html

    https://cunori.edu.gt/campus/app/upload/users/7/7334/my_files/slot-online.html

    http://u-rus.com.ar/aula/app/upload/users/1/1322/my_files/slot.html

    http://icrodarisoveria.edu.it/chamilo/app/upload/users/1/1855/my_files/slot.html

    https://iestpliliagutierrez.edu.pe/clarolgm/courses/CASINO/document/slot.html

    http://pva.cobach.edu.mx/app/upload/users/7/7379/my_files/slot.html

    http://www.imb-pc-online.edu.gt/PL/app/upload/users/3/373/my_files/slot.html

    http://avcs.upeu.edu.pe/main/upload/users/3333/my_files/slot.html

    https://chamilo.fca.uas.edu.mx/app/upload/users/1/11186/my_files/slot-online/

    TechBizWeb
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • Guest Post
    • About Us
    • Privacy Policy
    • Our Authors
    • Terms and Conditions
    • Contact
    © 2023 Tech Biz Web. Developed by Sawah Dev.

    Type above and press Enter to search. Press Esc to cancel.