A zero day attack is one of the fiercest forms of cyber attacks, because the targets have one hundred percent vulnerability to them. What makes them so feared among the software developers is that zero day attacks, also called day zero attacks or zero hour is that they exploit vulnerabilities that have not yet been acknowledged neither by the developers nor by the users. So the soft developers have no time (zero hour / zero day) to fix the problem or to release a patch that introduces updates meant to solve the vulnerabilities. Being such an efficient weapon, the zero day attacks are often sold by the hackers to the governments, so that zero day exploits would be integrated in the cyber warfare of a particular country. Recently, Adobe Flash and Windows have been zero-dayed by a group of Russian based hackers.
A report which has been accomplished by the cyber security firm FireEye has been recently published. The report is in the connection to the recent zero days attacks that have targeted Adobe Flash and the Windows operating system by American tech giant Microsoft. The group of hackers who may have operated the attacks has been labelled as APT28 and, according to the report, the cyber assailants are working in Russia. The report has also added that it is probable the hackers may have links with the government of the Russian Federation.
Adobe Flash and Windows have been zero-dayed recently and this event is alarming as it confirms the growth of cyber warfare around the globe. Only a week ago, the FireEye cyber security firm released a report on the activity of another group of hackers, APT30, who are pressumed to have ties with the Chinese government and who may be responsible for cyber attacks against software functioning in South Asia, beginning with the year 2005.
As for the recent zero day attacks, Darien Kindlund, who is in the position of director of the threat intelligence department at FireEye has commented in a staement for eWEEK.
“The target firm is a foreign government entity in an industry vertical that aligns with known APT28 targeting. We cannot be any more specific than that. We detected this attack in real time, reporting the attack to the victim accordingly.”
Darien Kindlund affiremed.
One of the soft vulnerabilities, labelled as CVE-2015-3043 which were exploited by the APT28 group was already on the list of issues to be fixed by Adobe. On April 13, FireEye discovered it and reported to the California based company.
Image Source: Foxbusiness