Site icon Bizety: Research & Consulting

Zero-day Exploits in the Eyes of FireEye

According to FireEye, zero-day attacks are one of the favorite methods attackers use to exploit software flaws within applications. By their very nature, zero-day vulnerabilities are imperfections in the software code that are known to threat actors before vendors and the public. It’s impossible to develop applications that are 100% secure, even with all the tools available for scanning and securing the software code during the development lifecyle. Over the years, threat actors have penetrated billion dollar companies with multimillion dollar security defenses, and the best that Defense-in-Depth has to offer.

The victims of zero-day attacks have included Adobe, Microsoft, Google, Symantec, RSA, Northrop Grumman, and many other large enterprises. The Target breach was catastrophic, however, from a technical perspective, there is one breach that was worse, and that was Apple. The security flaw within the iOS code enabled the hackers to join in the conversation during the handshake process, thus making encryption useless. According to many experts, the flaw was due to sloppy programming, that bypassed the entire chain of command at Apple, something that should have been detected immediately. Below is a summary of the 2013 FireEye Survey called “Less Than Zero”.

 2013 FireEye Survey Recap
Some of the most Destructives Zero-day Attacks

For the full report, click here.

Exit mobile version