Sunday , December 22 2024
Home / Media OutReach / Nearly a Quarter of Exploits Sold on Cybercriminal Underground Are More Than Three Years Old

Nearly a Quarter of Exploits Sold on Cybercriminal Underground Are More Than Three Years Old

Trend Micro research warns of threat from unpatched legacy vulnerabilities

HONG KONG SAR – Media
OutReach
 – 14 July 2021 –  (;),
a global
cybersecurity leader, released new research
urging organizations to focus patching efforts on the vulnerabilities that pose
the greatest risk to their organization, even if they are years old.


 


Trend
Micro Research found that 22% of exploits for sale in underground forums are
more than three years old.


 


To
view a full copy of the report, The Rise and Fall of the N-day Exploit
Market in Cybercriminal Underground
, please visit:
https://www.trendmicro.com/vinfo/hk/security/news/vulnerabilities-and-exploits/trends-and-shifts-in-the-underground-n-day-exploit-market.


 


“Criminals know that organizations are
struggling to prioritize and patch promptly, and our research shows that patch delays are
frequently taken advantage of,” said
Tony Lee, head of consulting at Trend Micro Hong Kong and Macau. “The lifespan
of a vulnerability or exploit does not depend on when a patch becomes available
to stop it. In fact, older exploits are cheaper and therefore may be more
popular with criminals shopping in underground forums. Virtual patching remains
the best way to mitigate the risks of known and unknown threats to your
organization.”


 


The
report reveals several risks of legacy exploits and vulnerabilities, including:

  • The
    oldest exploit sold in the underground was for CVE-2012-0158, a Microsoft RCE.
  • CVE-2016-5195,
    known as the Dirty Cow exploit, is still ongoing after five years.
  • In
    2020, WannaCry was still the most detected malware family in the wild, and
    there were over 700,000 devices worldwide vulnerable as of March 2021.
  • 47%
    of cybercriminals looked to target Microsoft products in the past two years.


The
report also reveals a decline in the market for zero-day and N-day
vulnerabilities over the past two years. This is being driven in part by the
popularity of bug bounty programs, like Trend Micro’s Zero Day Initiative, and
the rise of Access-as-a-Service – the new force in the exploit market.


 


Access-as-a-Service
has the advantages of an exploit, but all the hard work has already been done
for the buyer, with underground prices starting at $1000USD.


 


These
trends are combining to create greater risk for organizations. With nearly 50
new CVEs released per day in 2020, the pressure on security teams to prioritize
and deploy timely patches has never been greater – and it’s showing. Today, the
time to patch averages nearly 51 days for organizations patching a new
vulnerability. To cover that gap in security protection, virtual
patching
is
key. It is based on intrusion prevention technology and offers a hassle-free
way to shield vulnerable or end-of-life systems from known and unknown threats
indefinitely.




 


Source link

About admin

Check Also

ZJLD Awarded the 2024 Hong Kong Corporate Governance and ESG Excellence Award by the Chamber of Hong Kong Listed Companies

HONG KONG SAR – Media OutReach Newswire – 20 December 2024 – The first baijiu …

Leave a Reply

Your email address will not be published.