BTC $51740.4000
ETH $3112.6552
BNB $388.4861
SOL $103.4699
XRP $0.5425
ADA $0.5914
AVAX $37.4726
TRX $0.1377
DOGE $0.0861
wstETH $3608.1939
LINK $18.7122
DOT $7.9253
WETH $3099.5051
UNI $11.0991
MATIC $0.9984
WBTC $51892.2111
IMX $3.2035
ICP $12.4694
LTC $70.1056
BCH $267.9077
CAKE $3.1362
FIL $8.1161
ETC $27.2027
KAS $0.1709
RNDR $7.2125
DAI $1.0003
HBAR $0.1094
ATOM $10.3766
INJ $35.7526
TON $2.0791
OKB $50.2401
VET $0.0451
FDUSD $1.0003
LDO $3.3874
GRT $0.2891
ARB $1.9019
STX $2.5976
XMR $129.3498
TIA $16.7710
XLM $0.1165
ENS $22.8347
NEAR $3.7109
APEX $2.4753
WEMIX $2.0914
MKR $2051.3393
RETH $3421.4719
ALGO $0.2075
BTC $51740.4000
ETH $3112.6552
BNB $388.4861
SOL $103.4699
XRP $0.5425
ADA $0.5914
AVAX $37.4726
TRX $0.1377
DOGE $0.0861
wstETH $3608.1939
LINK $18.7122
DOT $7.9253
WETH $3099.5051
UNI $11.0991
MATIC $0.9984
WBTC $51892.2111
IMX $3.2035
ICP $12.4694
LTC $70.1056
BCH $267.9077
CAKE $3.1362
FIL $8.1161
ETC $27.2027
KAS $0.1709
RNDR $7.2125
DAI $1.0003
HBAR $0.1094
ATOM $10.3766
INJ $35.7526
TON $2.0791
OKB $50.2401
VET $0.0451
FDUSD $1.0003
LDO $3.3874
GRT $0.2891
ARB $1.9019
STX $2.5976
XMR $129.3498
TIA $16.7710
XLM $0.1165
ENS $22.8347
NEAR $3.7109
APEX $2.4753
WEMIX $2.0914
MKR $2051.3393
RETH $3421.4719
ALGO $0.2075
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Most of the zero day vulnerabilities last year were used by Chinese hackers

    Researchers from the Mandiant threat analysis company have recently released a detailed report for 2022 on the use of hackers around the world of zero-day vulnerabilities. According to experts, last year, a total of 55 zero-day vulnerability was recorded. For comparison, in 2021 they were recorded even more - 81 vulnerability. Nevertheless, this figure is still significant and reflects the overall tendency to use by attackers of previously unknown vulnerability, which allows them to apply their strokes to where no one expects this.

    Mandiant singled out Chinese state-linked hackers. They are still the most active exploiters of zero-day vulnerabilities. And on the motivation of attackers, the researchers determined that out of 16 vulnerabilities analyzed in detail, as many as 13 were used for the purpose of cyber espionage.

    State-backed hackers have been particularly focused on peripheral network devices such as firewalls and routers in the past year. Attacks on these systems have become especially attractive because endpoint vulnerability detection software often does not cover these devices and does not provide a sufficiently high level of protection. In a separate report published by Mandiant on March 16, the researchers described how Chinese hackers have heavily targeted Fortinet and VMware security products in an attempt to maintain persistence on compromised networks.

    In the past, exploiting zero-day vulnerabilities has always been the prerogative of state-backed hackers. Largely due to the complexity and cost of obtaining these vulnerabilities. However, now even simple private groups of attackers are increasingly using such vulnerabilities in their own campaigns.

    The advent of ransomware has led to huge profits for cybercriminals. And it is ransomware that accounts for 75% of zero-day exploits, according to the Mandiant report.

    Tracking and analyzing the exploitation of zero-day vulnerabilities is a complex task. Therefore, it is likely that there were much more such attacks over the past year than researchers know. In general, Mandiant predicts an increase in the number of zero-day vulnerabilities, since their use provides attackers with obvious advantages such as ease of exploitation, a high probability of success of such an attack, and stealth that other types of vulnerabilities cannot provide.

    However, Mandiant expects in the near future a massive transition of companies to cloud solutions, whose vendors will be able to quickly deploy the latest security patches on their own, without relying on system administrators on site. So, hypothetically, the number of cases of exploitation of such vulnerabilities will be significantly reduced.

    Author DeepWeb
    Winter Vivern steals government letters through Zimbra vulnerability
    New backdoor distribution method revealed

    Comments 0

    Add comment