The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]

Attackers are becoming faster at exploiting previously undisclosed zero-day flaws, according to Palo Alto Networks.

The company warns in its 2022 report covering 600 incident response (IR) cases that attackers typically start scanning for vulnerabilities within 15 minutes of one being announced.

Among this group are 2021’s most significant flaws, including the Exchange Server ProxyShell and ProxyLogon sets of flaws, the persistent Apache Log4j flaws aka Log4Shell, the SonicWall zero-day flaws, and Zoho ManageEngine ADSelfService Plus.

“Anytime a new vulnerability is publicized, our threat intelligence team observes widespread scanning for vulnerable systems,” the company says in its 2022 Incident Response Report.

Another major flaw that had attackers swiftly scanning the internet for affected devices was F5’s critical bug in its Big-IP software, which Cybersecurity and Infrastructure Security Agency (CISA) added to its growing Known Exploited Vulnerabilities Catalog in May. Palo Alto Networks saw 2,500 scans for it within 10 hours of it rolling out a signature for the flaw.

While phishing remains the biggest method for initial access, accounting for 37% of IR cases, software vulnerabilities accounted of 31%. Brute-force credential attacks (like password spraying) accounted for 9%, while smaller categories included previously compromised credentials (6%), insider threat (5%), social engineering (5%), and abuse of trusted relationships/tools (4%).

Over 87% of the flaws identified as the source of initial access fell into one of six vulnerability categories.