Symantec: Security Flaws Exploited Much Faster - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

05:05 PM
Connect Directly

Symantec: Security Flaws Exploited Much Faster

A report from Symantec concludes that the rate of discovery for Internet security flaws is leveling off, but the flaws are being exploited much more quickly.

The only good news in this week's report from security-software vendor Symantec Corp. is that the rate at which Internet security holes are found leveled off at seven per day in the last six months of 2003. The bad new is that those flaws are being exploited much more quickly.

A prime concern of security pros is the time from when a vulnerability is disclosed publicly--often by software makers, who publish a patch at the same time--and when writers of worms or virus write malicious code to exploit it.

"We looked at the life cycle from vulnerability to attack, and we could see there that the speed is consistently getting faster and faster," says Vincent Weafer, senior director of Symantec Security Response. Symantec didn't quantify the average response, but cited examples to support the conclusion. Weafer compares the three weeks it took for the Blaster worm to emerge last August to the three days that elapsed between the recent leak of Microsoft source code onto the Net and an attack based on that code.

The compressed time leaves businesses increasingly vulnerable, since days or months can pass before patches get deployed at a typical company.

Compounding the problem is the fact that blended threats, such as viruses that install backdoors for hackers after a successful infection, are on the rise. These attacks tend to be more sophisticated and more damaging. The report notes that blended threats make up 54% of the top 10 malicious code submissions the company received in the latter half of 2003. Of the top 50 malicious code submissions, backdoor-capable code in particular increased 123%.

These backdoors can be used for hackers to steal confidential information or hijack a machine and force it to participate in a denial-of-service attack or to send spam. This trend seems to be confirmed by the findings of anti-spam vendor MX Logic Inc.: 30% to 50% of spam comes from infected hosts, it estimates.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
2021 Outlook: Tackling Cloud Transformation Choices
Joao-Pierre S. Ruth, Senior Writer,  1/4/2021
Enterprise IT Leaders Face Two Paths to AI
Jessica Davis, Senior Editor, Enterprise Apps,  12/23/2020
10 IT Trends to Watch for in 2021
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/22/2020
Register for InformationWeek Newsletters
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll