{"id":16282,"date":"2021-07-14T06:10:00","date_gmt":"2021-07-14T06:10:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/07\/14\/nearly-a-quarter-of-exploits-sold-on-cybercriminal-underground-are-more-than-three-years-old\/"},"modified":"2021-07-14T06:10:00","modified_gmt":"2021-07-14T06:10:00","slug":"nearly-a-quarter-of-exploits-sold-on-cybercriminal-underground-are-more-than-three-years-old","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/07\/14\/nearly-a-quarter-of-exploits-sold-on-cybercriminal-underground-are-more-than-three-years-old\/","title":{"rendered":"Nearly a Quarter of Exploits Sold on Cybercriminal Underground Are More Than Three Years Old"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\"><!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p class=\"subheadline\">\n                               Trend Micro research warns of threat from unpatched legacy vulnerabilities                            <\/p>\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media&#13;<br \/>\nOutReach<\/a>\u00a0&#8211;\u00a014 July 2021\u00a0&#8211;\u00a0<a href=\"https:\/\/www.trendmicro.com\/en_hk\/business.html\"\/> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\"\/>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\"\/>),&#13;<br \/>\na global&#13;<br \/>\ncybersecurity leader, released new research&#13;<br \/>\nurging organizations to focus patching efforts on the vulnerabilities that pose&#13;<br \/>\nthe greatest risk to their organization, even if they are years old.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Trend&#13;<br \/>\nMicro Research found that 22% of exploits for sale in underground forums are&#13;<br \/>\nmore than three years old.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>\u00a0<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>To&#13;<br \/>\nview a full copy of the report, <i>The Rise and Fall of the N-day Exploit&#13;<br \/>\nMarket in Cybercriminal Underground<\/i>, please visit: <\/b><a href=\"https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/news\/vulnerabilities-and-exploits\/trends-and-shifts-in-the-underground-n-day-exploit-market\">https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/news\/vulnerabilities-and-exploits\/trends-and-shifts-in-the-underground-n-day-exploit-market<\/a><b>.<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;Criminals know that organizations are&#13;<br \/>\nstruggling to prioritize and patch promptly, and our research shows that patch delays are&#13;<br \/>\nfrequently taken advantage of,&#8221; said&#13;<br \/>\nTony Lee, head of consulting at Trend Micro Hong Kong and Macau. &#8220;The lifespan&#13;<br \/>\nof a vulnerability or exploit does not depend on when a patch becomes available&#13;<br \/>\nto stop it. In fact, older exploits are cheaper and therefore may be more&#13;<br \/>\npopular with criminals shopping in underground forums. Virtual patching remains&#13;<br \/>\nthe best way to mitigate the risks of known and unknown threats to your&#13;<br \/>\norganization.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The&#13;<br \/>\nreport reveals several risks of legacy exploits and vulnerabilities, including:<\/p>\n<ul>\n<li>The&#13;<br \/>\noldest exploit sold in the underground was for CVE-2012-0158, a Microsoft RCE.<\/li>\n<li>CVE-2016-5195,&#13;<br \/>\nknown as the Dirty Cow exploit, is still ongoing after five years.<\/li>\n<li>In&#13;<br \/>\n2020, WannaCry was still the most detected malware family in the wild, and&#13;<br \/>\nthere were over 700,000 devices worldwide vulnerable as of March 2021.<\/li>\n<li>47%&#13;<br \/>\nof cybercriminals looked to target Microsoft products in the past two years.<\/li>\n<\/ul>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The&#13;<br \/>\nreport also reveals a decline in the market for zero-day and N-day&#13;<br \/>\nvulnerabilities over the past two years. This is being driven in part by the&#13;<br \/>\npopularity of bug bounty programs, like Trend Micro&#8217;s Zero Day Initiative, and&#13;<br \/>\nthe rise of Access-as-a-Service \u2013 the new force in the exploit market.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Access-as-a-Service&#13;<br \/>\nhas the advantages of an exploit, but all the hard work has already been done&#13;<br \/>\nfor the buyer, with underground prices starting at $1000USD.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>These&#13;<br \/>\ntrends are combining to create greater risk for organizations. With nearly 50&#13;<br \/>\nnew CVEs released per day in 2020, the pressure on security teams to prioritize&#13;<br \/>\nand deploy timely patches has never been greater \u2013 and it&#8217;s showing. Today, the&#13;<br \/>\ntime to patch averages nearly 51 days for organizations patching a new&#13;<br \/>\nvulnerability. To cover that gap in security protection, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/security-101-virtual-patching\">virtual&#13;<br \/>\npatching<\/a> is&#13;<br \/>\nkey. It is based on intrusion prevention technology and offers a hassle-free&#13;<br \/>\nway to shield vulnerable or end-of-life systems from known and unknown threats&#13;<br \/>\nindefinitely.<\/p>\n<p>&#13;<br \/>\n&#13;<br \/>\n&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-07-14\/86109\/nearly-a-quarter-of-exploits-sold-on-cybercriminal-underground-are-more-than-three-years-old\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro research warns of threat from unpatched legacy vulnerabilities HONG KONG SAR &#8211;\u00a0Media&#13; OutReach\u00a0&#8211;\u00a014 July 2021\u00a0&#8211;\u00a0 (;),&#13; a global&#13; cybersecurity leader, released new research&#13; urging organizations to focus patching efforts on the vulnerabilities that pose&#13; the greatest risk to their organization, even if they are years old. &#13; &#13; \u00a0 &#13; &#13; Trend&#13; Micro &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/16282"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=16282"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/16282\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=16282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=16282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=16282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}