500+ vulns reported to the National Vulnerability Database in 1H 2016
Vulnerabilities are on the rise, with 516 reported to the National Vulnerability Database in the first half of 2016 compared to only 403 total vulnerabilities were reported in 2015.
According to Bromium's semi-annual threat report, fewer exploitable vulnerabilities were discovered in popular software systems.
No exploits were found in Adobe PDF, Chrome, Firefox, Java and comparatively few were found in other softwares like Internet Explorer (two exploits), Microsoft Office (two exploits) and Silverlight (one exploit) than in previous years.
The most outstanding exception for increasing exploits remains Adobe Flash, which had 31 exploits in 1H 2016, up from eight exploits total in 2015 (74 percent increase). Flash remains a top target for criminals.
The most used exploit kits are Neutrino and Rig. Angler and Nuclear kits were on the list, but disappeared during the first week of June. Experts in the industry feel as though crackdowns on cyber-crime groups caused attackers to switch to Neutrino and Rig in order to keep malware campaigns going.
Since the start of 2016, many new ransomware families have been released into the wild. The top malware campaign is Locky, with 755 tracked instances infecting removable drives and RAM disks.
“As an industry, we've always said there's no one silver bullet to address the complexities of attacks that are affecting our business. However, our latest research shows that enterprises and vendors alike are stepping up to do better at securing their networks and data. But there's still work to be done. Old attack tactics like phishing and watering holes persist, and new attack techniques are always emerging. Automated attacks are consistently bypassing anti-virus (AV) solutions; and malware is morphing every new instance in a network to bypass and therefore render AV useless,” said Rahul Kashyap, EVP and chief security architect at Bromium.
“Over the course of the next year, I expect attackers will continue to leverage social engineering tactics to exploit users. What's abundantly clear from our report is that the need to implement instant protection, detection and remediation is more critical than ever,” Kashyap added.