Report: Exploits Rate Reaches 61 Percent

  /     /     /  
Publicated : 22/11/2024   Category : security


Report: Exploits Rate Reaches 61 Percent


Attackers exploited more new vulnerabilities in January than usual, writing exploits for half of critical vulnerabilities



The number of exploited vulnerabilities jumped dramatically last month, with more than 60 percent of new vulnerabilities being exploited, a new report says.
Exploit activity is typically at a rate of 30 to 40 percent, according to Fortinets newly released January 2011 Threat Landscape report. Close to half of critical vulnerabilities were exploited by attackers, the report found.
It is no secret that software vulnerabilities continue to be disclosed in large numbers on an ongoing basis -- especially critically rated ones, said Derek Manky, senior security strategist at Fortinets FortiGuard Labs. Hackers are sinking their teeth into unprotected systems, thanks to readily available exploit code and attack frameworks that support these new vulnerabilities. Since they are freshly disclosed, not everyone may have up-to-date signatures or proper patches in place.
At the top of the list of malware detected by Fortinet were the Feebs, Buzus, and Virut families. These are not new threats, yet they remain quite persistent and active. Feebs is a mass mailer that uses Javascript to infect systems: the mail will contain a password protected archive, along with the information in the mail body. Buzus continues to be active in the spam scene, sending infected attachments of itself using a variety of spam campaigns linked to Twitter, Facebook, Google, Hallmark and Hi5. They’re clearly putting more effort into their social engineering tactics by leveraging well known names, Manky blogged.
Virut is especially difficult because it contains a bot component, he said in his
post
. FortiGuard Labs observed Virut downloading other botnets (VBCF) -- meaning an infected system would soon have multiple pieces of malware in place. Virut is one of the most persistent botnets we see today, since it is tough to remove from an infected system, uses a public IRC domain (has not been taken offline during its four-year run), and has hybrid spreading capabilities.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Report: Exploits Rate Reaches 61 Percent