2 min read

U.S Government Lists CVEs Most Exploited by Foreign Cyber Adversaries

Silviu STAHIE

May 13, 2020

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
U.S Government Lists CVEs Most Exploited by Foreign Cyber Adversaries

A joint report from the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and the broader U.S. government offers information about the commonly known vulnerabilities exploited by sophisticated foreign cyber actors.

Outdated software and hardware remain one of the most significant security problems for companies and organizations, and it”s a main route attackers looking for a way in will take. Not surprisingly, bad actors usually look for vulnerabilities that were never patched, even though, patches are usually available.

It”s true that attackers sometimes use zero-day vulnerabilities, exploits that are unknown and unpatched, but that”s the exception and not the rule.

“The public and private sectors could degrade some foreign cyber threats to U.S. interests through an increased effort to patch their systems and implement programs to keep system patching up to date,” says the advisory.

“A concerted campaign to patch these vulnerabilities would introduce friction into foreign adversaries” operational tradecraft and force them to develop or acquire exploits that are more costly and less widely effective. A concerted patching campaign would also bolster network security by focusing scarce defensive resources on the observed activities of foreign adversaries.”

The most exploited vulnerabilities between 2016 and 2019 are: CVE-2017-11882, CVE-2017-0199, CVE-2017-5638, CVE-2012-0158, CVE-2019-0604, CVE-2017-0143, CVE-2018-4878, CVE-2017-8759, CVE-2015-1641, and CVE-2018-7600.

According to cybersecurity specialists in the U.S. government, Microsoft”s Object Linking and Embedding (OLE) technology is often exploited, followed in second place by widespread Web framework known as Apache Struts.

Foreign actors from China, Iran, North Korea, and Russia are the most frequent users of vulnerabilities, looking for companies and organizations that have yet to apply the patches for the vulnerabilities mentioned above.

Finally, the landscape in 2020 looks a little bit different, with bad actors exploiting unpatched VPN vulnerabilities, for Citrix VPN or Pulse Secure VPN. Also, the surge of people working from home determined criminals to target organizations whose hasty deployed Microsoft O365 without implementing the necessary security measures.

The advisory also lists the mitigations for the mentioned vulnerabilities, which most of the time can be done just by installing the latest updates.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read