Tools for Amateur and Professional Hacker to Exploit Vulnerabilities

The Russian cybercrime underground provides a wide range of tools for amateur and professional hackers, enabling them to leverage the latest application vulnerabilities to target their victims. In order to exploit vulnerabilities in applications and use them to deliver malware and compromise user endpoints, you don’t have to be a genius or have years of hacking expertise. It’s all available for sale.

Trusteer’s security team has recently identified a new offering from a Russian cybercrime forum member: An exploit that is successful 95 percent of the time, according to the seller, which might be related to the stability of the exploit implementation. According to the post, which appeared on a Russian cybercrime forum, the new exploit targets an Adobe Flash Player vulnerability (CVE_2014_0497). Adobe provided a critical patch for this vulnerability on Feb. 4 after an exploit targeting this vulnerability was already seen in the wild.

By exploiting this vulnerability, an attacker can execute arbitrary code and potentially gain remote control of the affected system. The seller, who calls himself “insomnius,” writes that the exploit is 95 percent successful on Internet Explorer (IE) and Firefox (FF). His post, translated from the original Russian, read: “I am selling source code CVE-2014-0497, it is working ~95 percent on IE and FF. All information about current exploit is in the first post.”

Unfortunately, the seller went dark after posting this message so we were unable to get further details about the offer. It could be because exploits targeting this vulnerability have already been included in exploit kits, thus making them highly accessible; likewise, it could also be because the exploit had already been sold to someone else.

If a Patch Exists, Why Are Cybercrime Exploits Successful?

You are probably wondering, “Why would hackers be interested in an exploit if a patch for the vulnerability already exists? Why can it still be successfully exploited?”

The sad reality is that many user endpoints are not properly patched. IT groups struggle to ensure that patches are deployed on all machines, especially those that travel in and out of the organization. Worse, the applications that are most difficult to patch are common applications like Java, Adobe Acrobat and Flash, which can be found on most user endpoints. Other common applications like Microsoft Word, Excel, Outlook, browsers and even media players all have vulnerabilities that can be exploited. Because it is so difficult to manage patches for all the different applications and versions running within the enterprise, many user machines remain vulnerable. The reality is that 60 percent of the exploits target vulnerabilities that have been known for over 12 months.

The worst are zero-day exploits, which target vulnerabilities that are not publicly known. Since they are unknown, there is no patch available to prevent exploitation. Therefore, zero-day exploits have very high success rate and are very valuable in the underground.

Download Free e-Book: Stopping Zero-Day Exploits For Dummies

More from Software Vulnerabilities

FYSA – Critical RCE Flaw in GNU-Linux Systems

2 min read - Summary The first of a series of blog posts has been published detailing a vulnerability in the Common Unix Printing System (CUPS), which purportedly allows attackers to gain remote access to UNIX-based systems. The vulnerability, which affects various UNIX-based operating systems, can be exploited by sending a specially crafted HTTP request to the CUPS service. Threat Topography Threat Type: Remote code execution vulnerability in CUPS service Industries Impacted: UNIX-based systems across various industries, including but not limited to, finance, healthcare,…

X-Force discovers new vulnerabilities in smart treadmill

7 min read - This research was made possible thanks to contributions from Joshua Merrill. Smart gym equipment is seeing rapid growth in the fitness industry, enabling users to follow customized workouts, stream entertainment on the built-in display, and conveniently track their progress. With the multitude of features available on these internet-connected machines, a group of researchers at IBM X-Force Red considered whether user data was secure and, more importantly, whether there was any risk to the physical safety of users. One of the most…

X-Force releases detection & response framework for managed file transfer software

5 min read - How AI can help defenders scale detection guidance for enterprise software tools If we look back at mass exploitation events that shook the security industry like Log4j, Atlassian, and Microsoft Exchange when these solutions were actively being exploited by attackers, the exploits may have been associated with a different CVE, but the detection and response guidance being released by the various security vendors had many similarities (e.g., Log4shell vs. Log4j2 vs. MOVEit vs. Spring4Shell vs. Microsoft Exchange vs. ProxyShell vs.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today