Advertisement
U.S. markets closed
  • S&P 500

    5,254.35
    +5.86 (+0.11%)
     
  • Dow 30

    39,807.37
    +47.29 (+0.12%)
     
  • Nasdaq

    16,379.46
    -20.06 (-0.12%)
     
  • Russell 2000

    2,124.55
    +10.20 (+0.48%)
     
  • Crude Oil

    83.11
    -0.06 (-0.07%)
     
  • Gold

    2,254.80
    +16.40 (+0.73%)
     
  • Silver

    25.10
    +0.18 (+0.74%)
     
  • EUR/USD

    1.0789
    -0.0005 (-0.04%)
     
  • 10-Yr Bond

    4.2060
    +0.0100 (+0.24%)
     
  • GBP/USD

    1.2613
    -0.0009 (-0.07%)
     
  • USD/JPY

    151.3120
    -0.0600 (-0.04%)
     
  • Bitcoin USD

    70,089.22
    -657.67 (-0.93%)
     
  • CMC Crypto 200

    885.54
    0.00 (0.00%)
     
  • FTSE 100

    7,952.62
    +20.64 (+0.26%)
     
  • Nikkei 225

    40,369.44
    +201.37 (+0.50%)
     

Software flaws used in hacking more than double, setting record

By Joseph Menn

SAN FRANCISCO, April 11 (Reuters) - The number of previously unknown software flaws used by hackers more than doubled last year, a new report says, in another sign of the increasing sophistication of cybercrime and online espionage.

Secret vulnerabilities in computer programs are especially prized by criminal gangs, law enforcement and spies because software vendors have not been warned and so cannot publish fixes.

In 2015, 54 such holes came to light and were deployed by hackers, according to a report published on Monday by the largest security software vendor, Symantec Corp. That is up dramatically from 24 the year before and 23 the year before that; the next-highest total over the past 10 years was 15 in 2007.

Symantec's total of "zero-day" or unknown vulnerabilities includes both flaws that were discovered because they were used by top-flight hackers who left tracks and those that were revealed to the public at the same time as the software maker.

In 2015, electronic files named "Hacking Team" were dumped on the Internet, including six zero-days that criminals quickly made use of.

Thousands of other flaws were identified as usual last year by vendors, outside researchers, and government agencies. The vendors develop and issue patches, either announcing the flaws or pointing to them by virtue of the fixes.

Since criminals and others immediately take advantage of flaws to reach into unfixed machines, users must patch rapidly and completely or face being hacked.

Though most attacks happen because of inadequate patching, the rapid spread of new flaws through "exploit kits" sold in underground forums has allowed zero-days to be obtained by more people, including those installing ransomware and programs for stealing financial logins.

Four of the five most-used zero-day vulnerabilities last year were in Adobe Systems Inc's Flash software, which can be used as a standalone program or a plug-in for various Web browsers, not all of which automatically update with Flash patches. Symantec said it expected Flash to become less popular as platforms stop supporting it, making it less of a bonanza for hackers.

Adobe said it had improved its security response. "Flash Player is one of the most ubiquitous and widely distributed pieces of software in the world, and as such, is a target of malicious hackers," the company said via email.

"With regards to zero-days, we've been able to expedite the patching process to just days." (Reporting by Joseph Menn; Editing by Andrew Hay)

Advertisement