Cybercriminals are quick to capitalize on the announcement of a newly discovered vulnerability -- CVE-2011-3544 -- in Java.
According to researchers from M86Security, popular web malware exploitation kits such as Phoenix exploit kit 3.0 and the Blackhole Exploit Kit version 1.2.1 were updated with a new recent exploit before a patch had been released.
Does this mean that cybercriminals are actively relying on zero day flaws as a success factor for their malicious campaigns? Not at all, as zero day flaws are not the primary growth factor of the cybercrime ecosystem. Instead, the cybercriminals rely on already patched vulnerabilities, whose active exploitation is the primary objective of web malware exploitation kits.
Based on third-party research from multiple sources, we can clearly conclude that end users aren't patching their third-party applications and browser plugins, making it fairly easy for cybercriminals to actively exploit this trend.
- 37 percent of users browsing the Web with insecure Java versions
- 56 percent of enterprise users using vulnerable Adobe Reader plugins
- Kaspersky: 12 different vulnerabilities detected on every PC
- Report: malicious PDF files becoming the attack vector of choice
- Report: Patched vulnerabilities remain prime exploitation vector