top of page
Writer's pictureInno-Thought Team

Attackers Move to Exploit High-Profile Zero Days: According to 2022 Unit 42 Incident Response Report

Software vulnerabilities remain a key avenue of initial access for attackers according to the 2022 Unit 42 Incident Response Report. While this underscores the need for organizations to operate with a well-defined patch management strategy, we’ve observed that attackers are increasingly quick to exploit high-profile zero-day vulnerabilities, further increasing the time pressure on organizations when a new vulnerability is disclosed.



The 2022 Unit 42 Incident Response Report analyzes more than 600 incident response cases conducted over the past year alongside in-depth interviews with our incident response experts to identify key patterns and trends that can be used by defenders to prioritize where and how to deploy protections.


Key topics covered in the Report include:

  1. Software Vulnerabilities and Initial Access

  2. Vulnerabilities Most Commonly Exploited for Initial Access

  3. Time to Patch Is Getting Shorter

  4. Conclusion

  5. Protections and Mitigations


Software Vulnerabilities and Initial Access


Software vulnerabilities remain one of the top observed access vectors for threat actors. We found that they were the suspected initial access vector of intrusion in 31% of our cases, second only to phishing at 37%.


Vulnerabilities Most Commonly Exploited for Initial Access


In cases where responders positively identified the vulnerability exploited by the threat actor, over 87% of them fell into one of six CVE categories -

  1. ProxyShell

  2. Log4j

  3. SonicWall CVEs

  4. ProxyLogon

  5. Zoho ManageEngine ADSelfService Plus

  6. FortiNet CVEs

Note that top categories include Log4j and Zoho ManageEngine ADSelfService Plus, both of which were high-profile zero-day vulnerabilities disclosed toward the end of 2021.


Anytime a new vulnerability is publicized, our threat intelligence team observes widespread scanning for vulnerable systems. Our security consultants say they’re also seeing threat actors – ranging from the sophisticated to the script kiddies – moving quickly to take advantage of publicly available PoCs to attempt exploits.


Time to Patch Is Getting Shorter


While some threat actors continue to rely on older, unpatched vulnerabilities, we’re increasingly seeing that the time from vulnerability to exploit is getting shorter. In fact, it can practically coincide with the reveal if the vulnerabilities themselves and the access that can be achieved by exploiting them are significant enough. For example, Palo Alto Networks released a Threat Prevention signature for the F5 BIG-IP Authentication Bypass Vulnerability (CVE-2022-1388), and within just 10 hours, the signature triggered 2,552 times due to vulnerability scanning and active exploitation attempts.


The 2021 Attack Surface Management Threat Report found that attackers typically start scanning for vulnerabilities within 15 minutes of a CVE being announced.


Additionally, end-of-life (EoL) systems remain unpatchable and available to an opportunistic attacker for exploitation. For example, the same report found that nearly 32% of exposed organizations are running the EoL version of Apache Web Server, which is open for remote code execution from the vulnerabilities CVE-2021-41773 and CVE-2021-42013.


It is expected this trend to continue and be augmented by the ongoing increase in internet-exposed attack surface.


Conclusion


Organizations may have previously grown used to taking time between the disclosure of a vulnerability and patching it, but while it’s still necessary to perform due diligence on a patch, attackers’ ability to scan the internet in search of vulnerable systems means it’s more important than ever to shorten the time it takes to patch. Organizations need to ramp up patch management and orchestration to try to close these known holes as soon as possible.


An attack surface management solution can help organizations identify vulnerable internet-exposed systems and can often catch systems that organizations may not be aware are running on the network.


The information in this blog is based on the 2022 Unit 42 Incident Response Report, which includes in-depth information on attacker behavior gathered from hundreds of incident response cases as well as a series of interviews with experienced incident responders. Defenders can use these insights to prioritize resources and close cybersecurity gaps that attackers look for and commonly exploit.


The report includes:

  • The seven most common contributing factors when a breach occurs.

  • Capabilities attackers most commonly use after initially compromising a network.

  • Our incident responders’ predictions for attack trends in the year to come.

  • The six key protections our experts recommend that organizations put in place.

Protections and Mitigations


Palo Alto Networks customers can take advantage of Cortex Xpanse for attack surface management. Customers also receive protections against the specific vulnerabilities discussed in this post through Cortex XDR, Prisma Cloud, Cloud Delivered Security Services and other products.

 

Download the full 2022 Unit 42 Incident Response Report to learn more, and register to attend the 2022 Incident Response Report webinar to hear leading security experts discuss the key findings in the report and answer your questions live.

13 views0 comments

Comentarios


connexion_panel_edited.jpg
CXO_8-in-1.png
subscribe_button.png
bottom of page