clock

A Warning about Zero-Day Vulnerability

A zero-day vulnerability is an exploit hackers are using to gain access to your information. They are in software, operating systems, browsers, and through your gateway to the Internet. A zero-day, also called zero-hour, is a security flaw in the code that cybercriminal can use to access your network. Zero-day means it’s a security flaw that has not been discovered by the programmers and the makers the products. There is no known fix, and by the time hackers attack, the damage is already done, before it can be patched.

In one day, cybercriminals can attack your network and access your information, taking you down before you can stop them.

Texas-based NSS Labs stated that boutique exploit providers like Endgame Systems, Exodus Intelligence, Netragard, ReVuln and VUPEN can sell more than 100 zero-day exploits in a year. Its research director, Stan Frei, commented that the average zero-day exploit could last for 312 days before it is detected. If this is true, these exploit providers probably provide access to at least 85 zero-day exploits on any given day of the year.

Ponemon Institute conducted a study on behalf of HP Enterprise Security reports that cyber crime costs on average $12.7 million for US companies, and it takes about 45 days to resolve a cyber attack.

A lot of zero-day vulnerabilities don't hit the mainstream media. Most companies don't want their customers to know they have been hacked. However, with zero-day vulnerabilities contained in programming code, the growth of cybercriminals accessing this security flaw is on the rise.

Recent Known Zero-Day Vulnerability

  • Sandworm (Microsoft OS kernel vulnerability) attack, targeted SCADA systems used a zero-day vulnerability: Microsoft fixed the error with a patch after the fact. However, while fixing that bug, they also found two other bugs in the code.
  • Adobe Flash Player zero-day exploit: Patches were promptly released for Windows, Mac, and Linux operating systems.
  • Internet Explorer Watering Hole Exploit: A vulnerability targeted IE 10 users visiting a malicious website.
  • Malicious Java script code targeted IE users
  • JavaScript-based PDF vulnerabilities

The largest Zero-day exploit in the last year was Heartbleed, a vulnerability in the OpenSSL cryptographic software library. If you're curious, you can read about SeaCat's interesting encounter with Heartbleed. It seems like we detected it and stopped it from entering our systems.

It's not surprising that today like everyone else, zero-day has gone mobile. Thus, when we designed and built our flagship product, SeaCat Mobile Secure Gateway, we made sure that we addressed this kind of vulnerability.

Implement whitelisting: By using a whitelist, only authorized users can access to your internal resources. SeaCat uses a whitelist to allow access only to permitted mobile application instances.

Restrict access: It's recommended to restrict direct access from the Internet to your internal network by setting up an in-between demilitarized zone (DMZ). You limit access from the Internet to the DMZ, the DMZ to the internal network, and so on. This move can block an attacker’s access to an unpatched vulnerability. SeaCat Gateway sits on your DMZ and acts as a shield, filtering in only authorized mobile clients.

Whitelisting and access restriction are just two small built-in defense mechanisms that come with SeaCat. Of course, SeaCat provides much more. Please check out the full product feature list.

If you're in the mobile enablement business, we love to connect with you. Send us an email at info@teskalabs.com or tweet to us TeskaLabs.

Photo credit: Instant Vantage via Imagecreator




You Might Be Interested in Reading These Articles

The World of Mobile Apps Is Not As Secure As You Think

Mobile app startup companies are notorious for cutting corners. One of the first things that is cut is security. After all, they have the big guys like Comcast, AT&T, and Verizon to protect mobile users, right? Wrong! All the way down the line. TechCrunch's article about security for mobile devices is an interesting theory on the state of security on the Internet. Although, they do hit the mark in the article about how companies fix the problem after the fact of the security breach.

Continue reading ...

startup security

Published on January 13, 2015

Industrial IoT Security: Cyber Security Implications for IT-OT Convergence

In June 2017, two information security firms researching the 2016 hack of the electricity grid in Ukraine announced that they had identified the malicious code used to shut down power stations and leave thousands of households and businesses in darkness for several hours. The malware used to target the Kiev power grid has been named Industroyer, and it serves as a sobering reminder about the dangers faced by the Industrial Internet of Things (IIoT).

Continue reading ...

security iot

Published on September 05, 2017

Android: The One That Gets The All the Attention - Developers, Hackers and YOU

Android is considered one of the best operating systems used in smart phones. This operating system is backed by Google, the number one search engine. The Google Play has become an obsession now, enjoying the biggest number of smart phone apps. Many of them are absolutely free. But what if we tell you that Android is the easiest operating system to hack and even customized apps such as Gmail can be hacked. Recently it was checked and confirmed that Gmail is one of the top endangered apps, which can be hacked very easily.

Continue reading ...

android security

Published on January 20, 2015