Zero-Day Security Exploits
www.gfi.com

Zero-Day Security Exploits

What is a zero-day security exploit?

A zero-day security exploit is one, where a hacker finds and exploits a ‘hole’ or ‘flaw’ in a system, service or a network on the same day, even before the authorized technical guys come to know it. Therefore, the term ‘zero-day exploit’! The hacker launches a cyber-attack on the system or the network and releases a worm or a virus, before the developers get an opportunity to create a patch to fix the ‘hole’ in the security system. These worms or viruses can be used by anyone to exploit the system or the network. There is no known security fix for the identified flaw because the developers are unaware of the threat. The zero-day exploits are often published by prominent hacker groups.

Initially, when a user becomes aware of a flaw, they can report it to the company to enable them to develop a patch for the flaw. The developers take necessary action to find a fix as soon as possible. However, when hackers get to know about it, they are quick to exploit it, probably on the same day. Because the flaw is so new, there is very little protection against the threat.

As soon as you read the words ‘flaw’ and ‘hole’, you might connect software bugs to these terms. Are these terms inter-changeable? Not really! Because a software bug may not be potentially dangerous and might refer to a flaw in the functionality of a system or a service. Put simply, it refers to any defect in a product. This need not necessarily be a vulnerability, using which a hacker can exploit or gain unauthorized access to the product. However, if the software bug is related to the security system of a product, then the bug becomes a security vulnerability.

The attackers make use of such zero-day exploits to compromise attacked systems and gain unauthorized access to common file types containing sensitive information. Otherwise, the attackers may also demand hush money from the organization, threatening their entire security system. The price of zero-day exploits can vary greatly, depending on number of factors. For example, a security hole existing in a number of versions of an operating system fetches more money to the hackers, than that of the one existing in just one or two versions.

Can you protect yourself?

The very nature of zero-day exploits confirms the fact that no product or network can be ‘absolutely’ safe, but there are safety measures that you can take to protect yourself from the destructive effects of these exploits.

Every user needs to have a sensible approach to computer security. Always avoid suspicious links on social media networks, e-mails and messages and downloading e-mail attachments from an unknown source. Businesses should set and follow certain regulations and procedures when it comes to securing sensitive data of the organization. Implementing virtual LANs protects individual transmissions and even intrusion detection systems play a vital role in preventing zero-day exploits.

Securing your Wi-Fi connections is an important aspect in your endeavors to protect your personal data. To maximize and strengthen security, make sure your network allows devices that implement the latest security protocol, Wi-Fi Protected Access 2(WPA2). Most access points, routers and gateways are shipped with a default service set ID, i.e. the public name of a network and administrative credentials to simplify the configuration of the network. Take care to change the default settings as soon as you set up the network. In the recent days, most of the Wi-Fi connections are compromised by dictionary and brute-force attacks. Hence, make sure your Wi-Fi password is strong enough to survive these attacks.

Think like a hacker, find safety measures and secure yourself!

James Fernandes

Cyber/Cloud Security Professional.

8 年

Nice Article !!!

回复
Srikkanth P

Cybersecurity Leader | CISM | CRISC | PMP | CGEIT | CCISO | CISA |

9 年

good one

Vamsi Nadella, PMP?

APAC Paid Media - OneSyndicate Program Leader

9 年

Good Share Nita!

Vamsi Nadella, PMP?

APAC Paid Media - OneSyndicate Program Leader

9 年

Excellent write up! thanks for sharing these thoughts.

Sumit Kumar, CISA, CISSP

Product Security | Cloud Security Architect | AWS Security Certified x2 | Cloud Risk and Compliance| AI Security | Azure Security | BlockChain Security | Data Privacy |Trainer | GDPR | DevSecOps | ISO 27001 LA

9 年

Great write up! Well explained

要查看或添加评论,请登录

Sherlin Oneeta Bastin的更多文章

  • Web Cache Deception Attacks

    Web Cache Deception Attacks

    In simple terms, an adversary can force the reverse proxy server to store sensitive contents of a user in cache which…

  • Secure User Passwords by Adding Salt and Pepper

    Secure User Passwords by Adding Salt and Pepper

    Let’s consider how a user, Bob, registers himself at a website and gets authenticated in a system where password-based…

    3 条评论
  • Forced Browsing - An Overview

    Forced Browsing - An Overview

    Imagine the following scenario! You are an application owner who meticulously reviewed the application architecture…

    1 条评论
  • Women in Cyber Security - How Wide Is the Gender Gap?

    Women in Cyber Security - How Wide Is the Gender Gap?

    I wish I could brush aside the figures and statistics that prove the existence of gender gap in the cyber security…

    7 条评论
  • Session Fixation Attack - Are You Secure?

    Session Fixation Attack - Are You Secure?

    Session fixation is an attack technique that allows an attacker to hijack a session of the victim by forcing a user’s…

    5 条评论
  • Path Traversal Attack

    Path Traversal Attack

    A simple definition of path traversal attack, also known as, directory traversal attack could be the following: This…

    3 条评论
  • Clickjacking - Is it a real threat?

    Clickjacking - Is it a real threat?

    Yaay! Finally, I have landed at the right website to download my favorite song. Let me click the link and save it in my…

    31 条评论
  • Man-in-the-Browser (MitB) Attack – Are You a Victim?

    Man-in-the-Browser (MitB) Attack – Are You a Victim?

    Man-in-the-browser attack, which is quite similar to man-in-the-middle (MitM) attack, is a highly effective and…

    11 条评论
  • Stagefright - The most frightful Android bug ever!

    Stagefright - The most frightful Android bug ever!

    Stagefright - What is it? The most recently discovered Android bug is nicknamed Stagefright, after the Stagefright…

社区洞察

其他会员也浏览了