This is the one of the most developing and advanced cyber-attack
specially uses by the cyber criminals. Cyber criminals are hard to find and
they are known as the black hat hackers. Mainly these cyber criminals can be categorized
into some groups according to their attacks, such as criminal who is working
alone, a team of cyber criminals organized as a group to make some cyber-attacks
(e.g. anonymous hacker group, shadow brokers) and the criminals who are
rented/governed by some organization (some black hat hackers are protected by
their governments) for their benefits. When we are considering the cyber-attacks,
most of them are based on the money gaining and some are personally targeted things.
Cyber criminals working for the organization, they sell the
trade attack tool kits for the organizations which are in executable formats to
crack the other organizations/personal information. Botnet services are also created
by the cyber criminals to make threat to the business organizations. According
to the works done by the cyber criminals we can give them some name (types),
such as script kiddies, scammers, phishers, political/religious/commercial
groups, insiders, APT agents, etc. This “Zero day exploit” is the newest and
advance method uses by the hackers to make cyber-attacks.
As general when we want to attack a system/software, we have
need to find its vulnerabilities/loop holes/security issues. Zero day attack is
also same as it is. But we can consider this attack as a race between the
developer/vendor of the system and the hacker. It is highly risky to the
vendors to avoid this kind of the attacks.
Here hacker identifies/found the potential issue of the system
as vulnerability (before the developer/vendor know the vulnerability), then the
hacker release some malicious code (virus, Trojans, malware, ransom-ware, etc.) to
hack/attack the system/make harm to system. Time between discovering the
vulnerability and the attack is known as the “zero day”. Hackers are need to
consider the previous security patch and they have to guess the coming patch to
defend their attack. Developers may take 1 month or 1 year to fix the attack.
The reason for this is, this attack is created uniquely for a system (not a
general purpose). It is coded newly to make attack to the system (new to world).
After this recovery the developer will release updates/patches to the software
to avoid this same attack again.
Recently occurred ransom-ware is a good example for the zero
day attack. This is specially targeting on the Microsoft computers to gain the
money. “Eternal blue” is the vulnerability that is found in the Microsoft Windows
Server Message Block. The main cause for the huge damage by this attack is the
careless of the users as well as the Microsoft. Microsoft released the security
patch before the attack but the users did not make their update and Microsoft
have many versions of operating systems in use and they have need to create the
security patch for all those versions. This process took long time and the
hackers (shadow brokers) use this opportunity firstly and make the attack by releasing
the ransom-ware name “wanna cry”.
Note: Don’t be careless if any updates/security
patches release
©IT Today
©IT Today
Comments
Post a Comment