13.07.2015 Views

2-Extended Analysis-Full

2-Extended Analysis-Full

2-Extended Analysis-Full

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Communities @ Risk 15EXTENDED ANALYSIS: 2.1 Summary, Methodology and Data <strong>Analysis</strong>CVEsCommon Vulnerabilities and Exposures (CVEs) is a dictionary of common names forpublicly known security vulnerabilities. CVEs are each assigned a unique identifiercode, with the form CVE-YYYY-NNNN, where YYYY indicates the year they wereidentified and NNNN are arbitrary digits. We identified 24 distinct CVEs used in 483of the email attacks as displayed in Figure 4.FIGURE 4: CVEs identified in samples during the study period.(Vertical gray bars represent the date the CVE was created and orange dots represent targeted attacks using that CVE.)The most common CVEs we observed were CVE-2010-3333 (used in 112 attacks)and CVE-2012-0158 (used in 294 attacks), which are both vulnerabilities in the wayMicrosoft Word handles RTF documents. Figure 4 clearly illustrates the shift in usefrom CVE-2010-3333 to CVE-2012-0158 in March and April of 2012. The popularityof these vulnerabilities is not limited to our dataset. They have been widely used inother attacks against a variety of targets.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!