News Security

Exploit leaks led to 5 million attacks in Q2 of 2017: Kaspersky Report

Exploit packages in-the-wild became the game changer of the cyber threat landscape in Q2 2017. In just 3 months, Kaspersky lab products have blocked more than five million attacks that involved exploits from archives leaked on the web. The growth peaked at the end of the quarter, indicating the unrelenting scale of this cyber threat. These are the main findings from Kaspersky Lab’s Q2 Malware Report.

An exploit is a type of malware that uses bugs in software to infect devices with additional malicious code like banking Trojans, ransomware or cyber espionage malware. Attacks conducted with the help of exploits are among the most effective as they generally do not require any user interaction, and can deliver their dangerous code without the user suspecting anything. Such tools are therefore widely used, both by cybercriminals seeking to steal money from private users and companies, and in sophisticated targeted attacks hunting for sensitive information.

The second quarter of 2017 experienced a massive wave of these in-the-wild vulnerabilities due to a number of exploits being leaked on the web. This entailed a significant change in the cyber threat landscape. The major kick-off was the Shadow Brokers’ publication of the “Lost In Translation” archive, which contained a large number of exploits for different versions of Windows.

Despite the fact that most of these vulnerabilities were not zero-day vulnerabilities and were patched by the Microsoft security update a month before the leak, the publication led to disastrous consequences. The average number of attacks per day is constantly growing: 82% of all attacks were detected in the last 30 days of the quarter.

The damage from malware that used exploits from the archive as well as the number of infected users is beyond counting – with ExPetr and WannaCry pandemics being the most notable examples. Another example is theCVE-2017-0199 vulnerability in Microsoft Office, discovered in early April. Despite the fact that it was patched in the same month, the number of attacked users peaked at 1.5 million. Overall, 71% of attacks on these users exploited theCVE-2017-0199vulnerability.

“The threat landscape of Q2 provides yet another reminder that a lack of vigilance is one of the most significant cyber dangers. While vendors patch vulnerabilities on a regular basis, many users don’t pay attention to this, which results in massive-scale attacks once the vulnerabilities are exposed to the broad cybercriminal community,” notes Alexander Liskin, security expert at Kaspersky Lab.

Other online threat statistics from the Q2, 2017 report include:

  • Kaspersky Lab solutions detected and repelled 342,566,061 malicious attacks from online resources located in 191 countries all over the world in Q2. This is less than in the previous period, where 479,528,279 malicious attacks from online resources located in 190 countries all over the world were detected.
  • Attempted infections by malware that aims to steal money via online access to bank accounts were discovered on 224,675 user computers, compared to 288,000 user computers in Q1.
  • Crypto-ransomware attacks were blocked on 246,675unique computers, compared to 240,799 computers in Q1.
  • Kaspersky Lab’s antivirus tool detected a total of 185,801,835 unique malicious and potentially unwanted objects in Q2, compared to a total of 174,989,956 unique malicious and potentially unwanted objects in the first quarter.
  • On average, 17.26% of Internet-connected computers in the world at least once faced a web attack using the Malware-class malicious objects.
  • To reduce the risk of infection, users are advised to:
  • Keep the software installed on your PC up to date, and enable the auto-update feature if it is available.
  • Wherever possible, choose a software vendor that demonstrates a responsible approach to a vulnerability problem. Check if the software vendor has its own bug bounty program.
  • Use robust security solutions and make sure they keep all software up to date.
  • Regularly run a system scan to check for possible infections.

Related posts

COAI announces its leadership for the year 2024-25 at AGM 2024


Mercury Security collaborates with HID


CFS ropes in new Global Head for IT