Cyber Bytes & Insights – Bite-Sized Cyber Training
The Cyber and Fraud Centre Scotland is delighted to launch a new training series, providing practical, hands-on exercises to boost cyber security readiness. Our Cyber…
A zero-day (0-day) vulnerability refers to a security risk in a piece of software with no patches or mitigations to prevent cybercriminals from exploiting them. A zero-day attack happens when threat actors use a new vulnerability to hack into a system.
Zero-day vulnerabilities can often be quite dangerous, especially when found on a program or device used by many systems. Antivirus and firewall software cannot typically recognise or prevent a zero-day attack; hackers then use this to their advantage and attempt to target vulnerable systems as quickly as possible. Typically, most hacks occur after an exploit for the vulnerability has been made public. Depending on the type of vulnerability, hackers will create malware that allows them to conduct exploits on a mass scale. Studies have shown that after zero-day vulnerabilities are disclosed, the number of malware variants exploiting them increases up to 83,000 times!
The public disclosure of a zero-day vulnerability is often not the first time the exposure has been seen or exploited. Cyber security researchers Leyla Bilge and Tudor Dumitraș have identified seven stages of a zero-day attack:
Nowadays, many vendors will try to release the vulnerability’s public disclosure alongside the patch’s release. Depending on the vendor and the vulnerability, they may refrain from releasing detailed information on how the exploit takes place, as it could lead to hackers taking advantage of the vulnerability before users have a chance to update their systems.
Zero-day vulnerabilities can have lasting effects on technology. For example, the Log4j vulnerability is still present on many millions of devices. It is still actively exploited by threat actors, despite a patch which was released soon after publicly disclosing the vulnerability.
Due to the nature of zero-day vulnerabilities, it is challenging to prevent them before they happen. However, it is possible to detect unusual and malicious activity within your organisation’s network that could indicate a threat actor is attempting to gain access to or already has compromised a device within your system.
Signs that a hacker has successfully compromised your network include;
Most targeted attacks using new vulnerabilities happen after a vendor has announced a zero-day exploit in their software. To prevent your devices from becoming a target, keep up-to-date with vendors that provide software your organisation relies on, no matter how insignificant. If an application has access to data and users, it can be exploited to let threat actors into your network!
If a new update is released, update all devices or applications as soon as possible, prioritising those that can be easily accessed from the internet, such as servers that handle public requests and webpages.
Vulnerabilities discovered on applications and devices that are no longer supported often never receive updates to patch them. For example, Windows 7 ceased being supported by Microsoft in January 2020, and any new vulnerabilities discovered for the operating system will never be officially fixed. If a threat actor finds an outdated device or software running on your network, it is the first thing they will target and could lead to your IT system being compromised. If possible, stop using any unsupported technology and move to newer, supported versions to strengthen the security of your network.
Ensure that antivirus and firewall applications are running on and protecting all devices connected to your organisation’s network. Additionally, regularly updating these devices will mean they can detect and prevent attempts to exploit new vulnerabilities.