News

5 minutes after the official bug report, hackers start looking for vulnerable devices

Experts from Palo Alto Networks have calculated that 5 minutes after the official announcement of the bug, the criminals are already looking for vulnerable devices. On average, every hour, attackers start new scans looking for vulnerable systems, and in general are much faster than companies that take time to fix bugs.

If information about some critical vulnerabilities appears on the network, hackers act even faster: new scans are launched within a few minutes.

Unfortunately for enterprises, these adversaries are much faster at finding vulnerable assets to attack than defenders are at finding those same assets to secure. It’s not just an arms race between adversaries and defenders in terms of conducting cyberattacks and protecting against them. There’s a sprint taking place as well in detecting systems with known vulnerabilities to cyberthreats.Rob Rachwald, Director of Product Marketing @ Palo Alto Networks writes.

To compile these statistics, Palo Alto Networks experts studied various scans of 50,000,000 IP addresses of 50 global enterprises, some of which are on the Fortune 500, from January to March 2021.

It found that, on average, it took companies about 12 hours to discover and patch a major new vulnerability.

Moreover, almost a third of the identified problems are related to RDP, which is a common target of ransomware, since they can use it to gain administrative access to servers. Misconfigured database servers, zero-day vulnerabilities in mission-critical Microsoft and F5 products, and insecure remote access (Telnet, SNMP, VNC) round out the list of common problems.

In turn, attackers often increase the frequency of their scans to 15 minutes when messages appear about a new critical vulnerability that are available for remote exploitation. Moreover, in some cases, hackers act even faster: for example, it took them only about 5 minutes to start scans, after detecting ProxyLogon errors in Microsoft Exchange Server and Outlook Web Access (OWA) problems.

Computing has become so cheap that a potential attacker only needs to spend about $10 on renting cloud computing power to do a cursory scan of the entire Internet for vulnerable systems.the experts explain.

Recall that we wrote that reserchers discovered in Google Cloud, AWS, and Azure Explore 34 Million Vulnerabilities. And that most of the exploits for 0-Day vulnerabilities are developed by private companies.

Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Sending

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button