Russia launched over a million cyber attacks in three months

Unit 42 researchers found 75% of the attacks were critical

Over a million network attacks originated from Russia from November 2020 to January 2021, according to a new report.

Unit 42 security researchers looked at network attack trends from last winter and found that 1.3 million seemed to originate from Russia. The US and China were numbers two and three, respectively. 

The researchers looked at over six million potential attacks caused by network traffic triggers. Of those, researchers classified 3.47 million as true attacks. Of all the attacks observed, researchers classified 75% as critical. That’s a sizable jump compared to the 50.4% classified as critical in the fall of 2020

The most popular form of attack was code execution, accounting for 46.6% of all attacks. Code execution and privilege escalation represented 17.3% of attacks, and 9.9% of attacks were SQL injection.

Over the three months, the most exploited vulnerabilities targeted vendors Linksys, D-Link, ThinkPHP, Drupal, and WordPress.

Several newly observed exploits emerged, including CVE-2020-28188CVE-2020-17519, and CVE-2020-29227, and hackers continuously exploited them in the wild as of late 2020 to early 2021.

The researchers found hackers frequently used vulnerabilities disclosed within the past year and exploited them between 2017 and 2020. They added that this highlighted the importance of applying security patches as soon as they become available to protect against the most recently discovered vulnerabilities.

One such flaw noted in the report was CVE-2020-28188. Researchers said TerraMaster Operating System’s PHP page /include/makecvs.php is vulnerable to a command injection vulnerability. In this vulnerability, an attacker can send a payload that will exploit the event parameter in the makecvs PHP page. After successful exploitation, attackers can take full control of servers. 

Another flaw mentioned was CVE-2020-17519. This vulnerability is due to a lack of proper checks on a user-supplied file path in Apache. 

Related Resource

Taking a proactive approach to cyber security

A complete guide to penetration testing

A complete guide to penetration testing - whitepaper from CyberCxDownload now

Flink's org.apache.flink.runtime.rest.handler.cluster.JobManagerCustomLogHandler class. A remote unauthenticated attacker can easily craft and send a directory traversal request, gaining access to sensitive information in the form of arbitrary files, said the researchers.

Researchers said that the data during the three-month period indicated attackers prioritize easily deployed and newly disclosed exploits. 

“While they keep ready-made, weaponized exploits handy, attackers will continuously enrich their arsenal with newly released vulnerabilities and the associated proofs-of-concept. This underscores the need for organizations to patch and implement best security practices regularly,” said researchers.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Microsoft touts new cyber security help for nonprofits
cyber security

Microsoft touts new cyber security help for nonprofits

22 Oct 2021
Ofcom report reveals alarming uptick in smishing attacks
scams

Ofcom report reveals alarming uptick in smishing attacks

22 Oct 2021
Graylog launches new cyber security solution to address legacy issues
cyber security

Graylog launches new cyber security solution to address legacy issues

21 Oct 2021
US to ban surveillance software exports to authoritarian governments
cyber security

US to ban surveillance software exports to authoritarian governments

21 Oct 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021