ZERO DAY ATTACKS
ZERO DAY ATTACKS

Zero-day attacks combined data from Google's Threat Analysis Group (TAG) and Mandiant revealed that 97 zero-day vulnerabilities were exploited in 2023. 

In 2014, Sony Pictures suffered one of the prominent Zero-day attacks, leading to a shutdown of computer infrastructure. The attackers used a variant of the Shamoon wiper malware to leak employee data, internal communications, executive salaries, and unreleased films. 

The timeframe between vulnerability disclosure and the emergence of exploits is estimated to be 14 days. However, once a zero-day vulnerability is disclosed, patches are generally developed using information from the attacks. Therefore, hackers usually have a limited window to exploit zero-day attacks.

This article describes zero-day attacks and best practices to protect you and your organization.

 

What Is a Zero-Day Attack?

A zero-day attack is an attack that takes advantage of a software security weakness that the developer may not be aware of. Zero-day attacks take advantage of zero-day vulnerabilities (new vulnerabilities without any known fixes). It is referred to as "zero-days" because they occur before any time elapses between when developers discover the vulnerability and when attackers exploit it.

Zero-day attacks can take various forms, including malware, adware, spyware, or unauthorized access to user information. Zero-day attackers can be cybercriminals, hacktivists or corporate spies. 

 

How Zero-Day Attack Works

Sometimes attackers find security vulnerabilities in systems before they’ve been detected by security researchers or the creators of those systems. These attackers often move quickly to exploit such zero days before fixes for them are developed and deployed. 

Also, depending on the complexity of the system and/or the vulnerability, efforts to address the zero-days are sometimes delayed between discovery and patching. Hackers exploit this window, sometimes selling exploits on the dark web for profit. Once the patch for a vulnerability is released, it ceases to be a zero-day threat.

 

Types of Zero-Day Attack

Zero-day attacks can broadly be categorized into two;

  1. Untargeted Attacks: Attackers cast a wide net, exploiting weaknesses in any accessible device. This can result in the compromise of sensitive data such as passwords, credit card details, or medical records. Moreover, compromised devices may be used as bots for Distributed Denial of Service (DDoS) attacks, magnifying their impact. 
  2. Targeted Attacks: These are tailored towards specific and often high-priority targets, including Small and Medium-sized Enterprises (SMEs), large corporations, government entities, prominent individuals and healthcare The motivation behind these attacks include financial gain, or espionage. In 2019, WhatsApp disclosed that NSO's technology had been employed to distribute malicious software to over 1,400 mobile devices through the exploitation of a previously unknown vulnerability. This malware initiated WhatsApp calls to targeted devices, implanting the Pegasus code on the devices, regardless of whether the recipients answered the call.

 

How To Protect Yourself Against Zero-Day Attacks

Due to the consequences of zero-day attacks, it is advisable to follow best practices to protect yourself and organization. Here are ways you can do that.

  1. Promptly update all software and operating systems to receive security patches to address newly discovered vulnerabilities. Microsoft revealed that a significant percentage of its customers are breached through vulnerabilities whose patches were released years ago.
  2. Create Cyber awareness in your organization by training employees. This will minimize the risk of human error often exploited by zero-day attacks which will be beneficial to your organization in the long run. For training that will empower your employees to combat cyber threats, contact us at Cyberkach.
  3. Adopt security tools equipped with behavior-based analytics to detect abnormal activities and anomalies within your network. This will provide early warning signs of potential threats, giving you ample time to take countermeasures.

 

Arguably, one of the most dangerous cyber attacks, zero-day attacks can disrupt operations in your organization. Unfortunately new vulnerabilities and exploits continue to emerge. 

Want to stay abreast? Subscribe to the Cyberkach blog.