Cybercriminals are moving too quickly for businesses to keep up

Representational image of data security
(Image credit: Kingston)

Many businesses can’t keep up with the speed at which cybercriminals exploit the vulnerabilities they find. Even though there’s usually a short window of opportunity between an exploit being discovered and it getting patched, malicious actors are quite good at using that window and wreaking havoc.

This is according to a new paper released by tech giants HP based on data aggregated from its Wolf Security suite. It analyzed “billions of attachments, web pages, and downloads with no reported breaches” to understand the behavior of malware in the wild, and found that the average time for a business to apply, test, and fully deploy a patch, with the proper checks is 97 days. 

While it would take a “highly capable” criminal to be able to exploit such a vulnerability at first, crooks have started developing automation scripts that have significantly lowered the bar for entry.

For example, zero-day CVE-2021-40444, a remote code execution vulnerability that enables exploitation of the MSHTML browser engine using Microsoft Office documents, was first discovered on September 8. Just a couple of days after the release of the initial bulleting - on September 10 - HP threat research team saw scripts designed to automate the creation of this exploit, being shared on GitHub.

The patch was issued on September 14.

Layered approach

This particular vulnerability was quite dangerous, too. It allows attackers to compromise the target device with almost no user interaction. Once the malicious file makes it onto the endpoint, all users need to do is preview it in File Explorer - they don’t need to open it or run any macros. Even previewing the file allows the attacker to compromise the machine, install backdoors and take the attack onto the next level.

“We expect threat actors to adopt CVE-2021-40444 as part of their arsenals, and potentially even replace common exploits used to gain initial access to systems today, such as those exploiting Equation Editor,” commented Alex Holland, Senior Malware Analyst, HP Wolf Security threat research team, HP.

With 89% of malware being delivered via email, and 12% of email malware bypassing at least one gateway scanner, detection alone won’t suffice, Dr. Ian Pratt, Global Head of Security for Personal Systems, HP, added. To stay secure in today’s dynamic threat landscape, businesses must take a layered approach to endpoint security, following zero trust principles, he concluded.

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Hacker Typing
Racing against time on a menacing caldera: survey finds majority of organizations take days to tackle critical vulnerabilities, each of them a potential open goal for cybercriminals
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
ransomware avast
AI is helping hackers get access to systems quicker than ever before
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
Abstract image of cyber security in action.
Four key questions to strengthen your cyber threat detection strategy
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost