Hackers start scanning for security flaws 15 minutes after disclosure

Hologram of security padlock operating on the electronic circuit CPU.
(Image credit: Getty Images)

The latest findings from cybersecurity researchers at Unit 42 are the prime example of the old adage “the enemy never sleeps”. 

Palo Alto Networks’ security arm recently published its newest Incident Response Report, in which it says that threat actors start scanning the web for vulnerable endpoints roughly 15 minutes after the CVE gets publicly disclosed. 

In other words, hackers are keeping close tabs on software vendor bulletin boards, and as soon one of them publicly announces finding a vulnerability, they rush to see where an exploit is possible.

Attacks within hours

Scanning in itself isn’t a threat, and knowing a vulnerability exists is one thing, while actually exploiting it is another. However, crooks still conduct these reconnaissance tasks as they can, if all else fails, sell the intel on the black market, the researchers said.

Some of them move fast, too - Unit 42 says that “within hours”, the first active exploitation attempts can usually be seen. 

According to Unit 42’s report, the most abused flaws in the first half of the year are the “ProxyShell” vulnerabilities, taking up 55% of all the reported incidents for the period. ProxyShell is a term that refers to abusing CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207, in a chain.

Log4Shell, the nightmare log4j vulnerability that experts expect will linger around for a decade, was second-placed with 14% of reports, followed by SonicWall CVEs with 7%. 

One of the takeaways of the report is that most of the time, cybercriminals abuse relatively old flaws, which just goes to show how important it is to patch systems, and programs, as soon as possible. Unit 42 has also said that in a third of network breaches, software vulnerabilities were used as the initial point of entry. Another third was taken up by phishing (37%) while brute-forcing, making up for 15%, rounds off the top three.

Via: BleepingComputer

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Hacker Typing
Racing against time on a menacing caldera: survey finds majority of organizations take days to tackle critical vulnerabilities, each of them a potential open goal for cybercriminals
Flag of the People's Republic of China overlaid with a technological network of wires and circuits.
One of the biggest flaws exploited by Salt Typhoon hackers has had a patch available for years
ransomware avast
AI is helping hackers get access to systems quicker than ever before
A person at a laptop with a cybersecure lock symbol floating above it.
Hackers are still using old Ivanti bugs to break into networks
A VPN runs on a mobile phone placed on a laptop keyboard
SonicWall firewalls hit by worrying cyberattack
The best free firewall
Palo Alto Networks PAN-OS sees authentication bypass under attack from hackers
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 16 (game #1147)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 16 (game #378)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 16 (game #644)
Three iPhone 16 handsets on show
Apple could launch an iPhone 17 Ultra this year – but we've heard these rumors before
Super Mario Odyssey
ChatGPT is the ultimate gaming tool - here's 4 ways you can use AI to help with your next playthrough