Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Exploit Kits Deliver Big Returns for Hackers

    By
    Sean Michael Kerner
    -
    June 11, 2015
    Share
    Facebook
    Twitter
    Linkedin
      hackers

      There are a lot of different ways that hackers can attack users and devices, but perhaps the easiest and most lucrative method is via an exploit kit. The new 2015 Trustwave Global Security Report reveals that hackers are getting an estimated 1,425 percent return on investment from exploit kit and ransomware campaigns.

      The report is based on 574 data compromises that Trustwave investigated. In contrast, Trustwave’s 2014 report was based on 691 data compromises.

      As to why exploit kits are so lucrative for attackers, there are a number of reasons. Karl Sigler, threat intelligence manager at Trustwave, explained that regular patching is a crucial component to preventing the exploit kits from putting ransomware on user systems from the start.

      “Exploit kits typically look for vulnerabilities in your Web browser or one of the browser’s many plug-ins,” Sigler told eWEEK. “If you keep your browser and plug-ins patched regularly, you should be immune to most exploit kits.”

      Lack of patching is something that vendors have been highlighting over the years. In February, Hewlett-Packard reported that 44 percent of all breaches could be attributed to patched vulnerabilities that were between 2 and 4 years old.

      In addition to regular patching of system components and applications, antivirus technologies still play a role in limiting the risk of exploit kits and ransomware. Sigler explained that it is post-exploitation when the malware gets placed on the victim’s computer.

      “Anti-malware technologies remain an important security control,” he said. “When used as a gateway filter, they can often detect and strip out ransomware before it strikes.”

      Trustwave’s analysis also found that 98 percent of the applications had at least one vulnerability in 2014. Sigler noted that many of the applications scanned by Trustwave are custom Web applications, so the vulnerabilities were new to the client and patches needed to be developed.

      “In the case of COTS [Common Off-The Shelf]-type applications, it was often the case of patches that had not been applied as opposed to the vulnerability being known about and then deprioritized,” Sigler said.

      Application vulnerabilities and lack of patching are not the only paths to exploitation that Trustwave discovered. The company found that 56 percent of compromises were a result of weak passwords and remote access security. Looking specifically at point-of-sale (PoS) breaches, the number rises dramatically, with 94 percent of breaches attributed to weak passwords and weak remote access security.

      Looking to the future, Sigler noted that while it’s still a little early for 2016 predictions, he believes that there may be an increase in malware-as-a-service models.

      “We’ve seen this in the Magnitude Exploit Kit, where rather than charge users, the criminals offer the service for free and take a cut on the back end,” Sigler said. “I expect we’ll see more of this type of model down the road.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×