3

What is a Zero Day Attack and How Can You Protect Against It?

 3 years ago
source link: https://hackernoon.com/what-is-a-zero-day-attack-and-how-can-you-protect-against-it-sr1h37vq
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

What is a Zero Day Attack and How Can You Protect Against It?

@jtruongJessica Truong

Interested in security? Follow along for content within Cybersecurity

A zero day vulnerability is a flaw, it is “an unknown exploit in the wild that exposes a vulnerability in software or hardware” (fireeye). The name refers to the fact that developers have zero days to fix the problem that has just arisen which may lead to hackers exploiting the vulnerability before a patch has been released.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

What is a Zero Day Attack? 

A zero day attack occurs once a software vulnerability has been exploited and the attacker has released malware before developers are able to create a patch to fix the vulnerability. Here is a step by step breakdown of what causes a zero day attack:

0 reactions
heart.png
light.png
money.png
thumbs-down.png
  • A company develops a software and was unaware of a vulnerability in its code
  • The hacker notices that there is a vulnerability before the developer does and immediately acts on it before the developer finds out
  • The hacker exploits the vulnerability while it is still unnoticed with the code that it has created 
  • Once the exploit has been released to the public, the developer catches it then creates a patch to fix the vulnerability

Who are the Attackers?

  • Cybercriminals
  • Hactivists 
  • Cyberwarfare
  • Corporate espionage

How to Protect Against a Zero Day Vulnerability

As of today, there are no patches or antivirus signatures available that can aid in zero day vulnerability detection. Therefore, it is important for your company to do the best they can to protect themselves against one. 

0 reactions
heart.png
light.png
money.png
thumbs-down.png

In order to keep your organization’s computer systems and data safe, it is imperative that your organization is proactive and reactive. Being proactive means to have antivirus software on your systems to detect and remove any viruses. Whereas reactive would be to consistently make sure that your software is up to date whenever a new update is available. This would reduce the risk of the hacker to exploit any vulnerabilities found in the software. 

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Performing a vulnerability scan may aid in finding new vulnerabilities that could have been introduced after a software update.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

The following lists what an an organization can do to protect their data against zero day vulnerabilities: 

0 reactions
heart.png
light.png
money.png
thumbs-down.png
  1. Make sure that you keep your software up to date with the latest software updates and releases; install the latest security patches as these would fix bugs missed from the previous versions
  2. Install an antivirus software to help block and prevent any possible threats
  3. Configure appropriate security settings for your antivirus software, operating system, and internet browser
  4. Use intrusion prevention systems (IPS)
  5. Establish disaster recovery procedures
  6. Implement a web application firewall (WAF)
0 reactions
heart.png
light.png
money.png
thumbs-down.png

Common Targets for Zero Day Attacks

The following lists the common targets for a zero day attack:

0 reactions
heart.png
light.png
money.png
thumbs-down.png
  • Government departments
  • Large enterprises
  • Browser or operating system; hackers can use vulnerabilities to compromise the computer systems and build botnets
  • Hardware devices, firmware, and Internet of Things (IoT)
0 reactions
heart.png
light.png
money.png
thumbs-down.png

3 Common Attack Vectors

  1. Web browsers (popular target)
  2. Email attachments, specifically when the user downloads and opens the attachment
  3. File types - i.e. Microsoft word, excel, PDF or Flash 
0 reactions
heart.png
light.png
money.png
thumbs-down.png

Zero Day Attack Examples

These are some well known zero day attacks:

0 reactions
heart.png
light.png
money.png
thumbs-down.png
  1. Stuxnet

    Stuxnet was “one of the earliest digital weapons used; it is a highly infectious self-replicating computer worm that disrupted Iranian nuclear plants” (Norton).

    Sony

    Sony Pictures was the victim of a zero day attack back in 2014. The attack “brought down Sony’s network, and attackers leaked sensitive corporate data on file sharing sites, including personal information about Sony’s employees and their families, internal correspondence, information about executive salaries, and copies of unreleased Sony films” (Cynet). 
  2. RSA

    Back in 2011, hackers utilized an unpatched vulnerability in Adobe Flash Player to gain entry into RSA’s network. The hackers sent an email to RSA employees with an attachment that activated a Flash file which as a result exploited the zero day flash vulnerability. The information that the hackers managed to steal included “key information used by RSA customers in SecurID security tokens” (Cynet).

This YouTube video gives a better explanation of what Stuxnet, as briefly discussed above is about.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

What is The Difference Between Targeted and Non-Targeted Zero Day Attacks?

Targeted Zero Day Attacks

0 reactions
heart.png
light.png
money.png
thumbs-down.png

These types of attacks are targeted towards large institutions, government or public institutions, and senior employees who have privileged access to confidential data and systems. 

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Non-Targeted Zero Day Attacks

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Non-Targeted Zero attacks are aimed towards a large group of users who are using a vulnerable system (i.e. browser or operating system). The hacker’s goal with this type of attack is to compromise a large group in order to use them to build botnets. 

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Unfortunately, zero day vulnerabilities still exist today and a current example is another zero day exploit found on the Google Chrome browser. According to TheHackerNews, “successful exploitation of the flaw could mean corruption of valid data, leading to a crash, and even execution of unauthorized code or commands” (TheHackerNews). Chrome users have been informed to update to the latest version. Therefore it is important for individuals to be educated and understand what can be done to protect against zero day vulnerabilities. 

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Reading security news like The Hacker News or of course, the security guides on HackerNoon would be beneficial as that is where you can find up-to-date cybersecurity information.  

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Keep up with all the latest in cybersecurity! Subscribe to our newsletter in the footer below.

0 reactions
heart.png
light.png
money.png
thumbs-down.png
8
heart.pngheart.pngheart.pngheart.png
light.pnglight.pnglight.pnglight.png
boat.pngboat.pngboat.pngboat.png
money.pngmoney.pngmoney.pngmoney.png
by Jessica Truong @jtruong. Interested in security? Follow along for content within CybersecurityRead my stories
Join Hacker Noon

Create your free account to unlock your custom reading experience.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK