internet security tHreAt rePOrt GOVernMent 2013
internet security tHreAt rePOrt GOVernMent 2013
internet security tHreAt rePOrt GOVernMent 2013
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
p. 24<br />
Symantec Corporation<br />
Internet Security Threat Report <strong>2013</strong> :: Volume 18<br />
VULNERabILITIES, ExPLOITS, aNd TOOLkITS<br />
Introduction<br />
Recent research by the Ponemon Institute suggests that the<br />
cost of cybercrime rose by six percent in 2012 with a 42 percent<br />
increase in the number of cyberattacks. The cost is significant<br />
with businesses incurring an average cost of $591,780. 13 Given<br />
the increase availability of vulnerabilities and exploits it comes<br />
as no surprise that the cybercriminals have increased their<br />
ability to make a profit.<br />
Quite a few diverse skills are needed to find vulnerabilities,<br />
create ways to exploit them, and then run attacks using them.<br />
Fortunately for the cybercriminal, a black market exists where<br />
these skills can be purchased in the form of toolkits. Hackers<br />
find and exploit and or sell vulnerabilities. Toolkit authors find<br />
or buy exploit code and incorporate it into their “products.”<br />
Cybercriminals in turn buy or steal the latest versions of toolkits<br />
which allow them to run massive attacks without the trouble of<br />
learning the skills needed to run the whole operation.<br />
data<br />
browser Vulnerabilities 2010 – 2012<br />
Source: Symantec<br />
50%<br />
45<br />
40<br />
35<br />
30<br />
25<br />
20<br />
15<br />
10<br />
5<br />
2010<br />
Apple Safari<br />
Google Chrome<br />
Mozilla Firefox<br />
Microsoft Internet Explorer<br />
Opera<br />
2011<br />
2012<br />
at a glance<br />
• Usage of zero-day vulnerabilities is up, from 8 to 14 in 2012.<br />
• There is an increasingly sophisticated black market serving a<br />
multi-billion dollar online crime industry.<br />
• These vulnerabilities are later commercialized and added<br />
to Web-attack toolkits, usually after they become published<br />
publicly.<br />
• In 2012, drive-by Web attacks increased by one third, possibly<br />
driven by malvertising.<br />
• Around 600,000 Macs were infected with Flashback malware<br />
this year.<br />
• The Sakura toolkit, which had little impact in 2011, now<br />
accounts for approximately 22 percent of Web-based toolkit<br />
attacks, overtaking Blackhole during some points of the year.<br />
Plug-in Vulnerabilities 2010 – 2012<br />
Source: Symantec<br />
50%<br />
45<br />
40<br />
35<br />
30<br />
25<br />
20<br />
15<br />
10<br />
5<br />
2010<br />
Adobe Flash Player<br />
Oracle Sun Java<br />
Adobe Acrobat Reader<br />
Apple QuickTime<br />
2011<br />
2012