Wednesday, September 30, 18:34
Home security These are the first ten security vulnerabilities most exploited by the hacker

These are the first ten security vulnerabilities most exploited by the hacker

Security vulnerabilities in Microsoft software have become an even more popular means of attack than cybercriminals - but Adobe Flash's vulnerability is still ranked as the second most exploited hacking group.

hacker hacker

Analyzes by researchers at Recorded Future of exploit kits, phishing attacks, and malware developed during 2018 found that defects in Microsoft products were the most consistent target during the of the year, representing eight of the top ten vulnerabilities. That number has increased from seven it was during the previous year. "Patches" are available for all defects in the list - but not all users update their applications, leaving them vulnerable.

Microsoft is the most common goal, probably thanks to the widespread use of its software. The top vulnerability in the list is CVE-2018-8174. With the Double Kill nickname, we are talking about a remote code execution error distributed in Windows VBSsript that can be exploited through Internet Explorer.

Double Kill was included in four of the most powerful exploitation kits available to hackers - RIG, Fallout, KaiXin and Magnitude - and helped deliver some of the most famous trojan and ransomware forms to unsuspecting victims.

But the second most commonly observed vulnerability during the year was one of two that did not target Microsoft's software: CVE-2018-4878 is a zero-day Adobe Flash that was first recognized in February.

An emergency patch was released within a few hours, but a large number of users did not apply it, leaving their systems open to attack. CVE-2018-4878 has since been included in many exploitation kits, mainly the Fallout Exploit Kit used for the GandCrab ransomware - the ransomware remains productive to date.

Adobe farms have been the most commonly used vulnerabilities by a hacker in cyberspace, but they seem to be moving away from them as we approach 2020.

Third, the most common list of vulnerabilities is CVE-2017-11882. It was unveiled in December of 2016 and is a security vulnerability in Microsoft Office that allows arbitrary code to run against a maliciously modified file with the file - it puts users' computers at risk of malware. CVE-2017-11882 has been associated with several malicious campaigns, such as the QuasarRAT trojan, the productive botnet Andromeda And much more.

Very few vulnerabilities remain in the top ten on an annual basis. CVE-2017-0199 - a vulnerability of Microsoft Office that can take control of an affected system - was the most commonly used by cyber criminals 2017, but it fell to 2018 in fifth place.

CVE-2016-0189 was the first to rank with vulnerabilities in 2016 and the second ranked 2017 and is still classified as the most frequent holdings. Internet Explorer zero-day continues to be strong almost three years after it first appeared, indicating that there is a real problem with users not applying updates to their browsers.

Applying the appropriate remedies to operating systems and applications can greatly advance the protection of organizations from some of the most commonly developed cyber attacks.

"The biggest difference is the importance of knowing the vulnerabilities sold in underground and dark online forums," Kathleen Kuczma, sales engineer at Recorded Future, told ZDNet.

"Although the ideal situation would be to repair everything, having an accurate picture of vulnerabilities affecting the most critical systems of a company, in combination with which vulnerabilities are actively exploited or developed, allows vulnerability management teams to prioritize the most important parts to fix, ”she added.

The only vulnerability outside of it Microsoft in addition to the vulnerability of Adobe, is CVE-2015-1805: Linux kernel vulnerability, which is often used to attack an Android smartphone with malware.

The ten most exploitable vulnerabilities according to Recorded Future Annual Vulnerability report are:

  1. CVE-2018-8174 - Microsoft
  2. CVE-2018-4878 - Adobe
  3. CVE-2017-11882 - Microsoft
  4. CVE-2017-8750 - Microsoft
  5. CVE-2017-0199 - Microsoft
  6. CVE-2016-0189 - Microsoft
  7. CVE-2017-8570 - Microsoft
  8. CVE-2018-8373 - Microsoft
  9. CVE-2012-0158 - Microsoft
  10. CVE-2015-1805 - Google Android

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehchttps://www.secnews.gr
Be the limited edition.

LIVE NEWS

As long as the technologies reach their EOL, the hackers are waiting

A recent outbreak of cyber attacks against web commerce sites using Magento 1 underscores the importance of having a strategy ...

Mac: How to export high quality icons from System Preferences

Sometimes, you need a high quality icon from Mac System Preferences for a project, but you can not find any ...

COVID-19 test: Approval in Europe for results in 15 minutes!

A test to detect the Covid-19 virus that gives results in 15 minutes has received the green light for disposal in ...

Gmail: How to add a signature to your emails

Google Gmail supports customizable signatures, which it attaches to every email you send. You can add your name, ...

A spy campaign targets the Indian army!

Security investigators have uncovered evidence of an ongoing espionage campaign targeting India's military (defense and armed forces), ...

Baidu: Malicious pop-up redirects traffic

Malicious pop-ups redirect the traffic of the website of the technology company Baidu, to the intruder's domain. The malicious ...

LinkedIn hacker Nikulin was eventually sentenced to 7 years in prison

A US judge on Tuesday sentenced Yevgeniy Nikulin to seven years in prison, ending an international legal drama ...

Inova Health: another victim of the Blackbaud breach

Inova Health Systems has sent letters to its patients, in order to inform them about a cyber attack, which is possible ...

Hackers distribute Exorcist 2.0 ransomware through fake software crack sites

The hackers behind the Exorcist 2.0 ransomware use a malicious advertisement, aimed at redirecting unsuspecting victims to fake ...

VMware: Acquires software maker SaltStack

With the acquisition of SaltStack, VMware said it will extend its automation capabilities beyond infrastructure, software and ...