{"id":16803,"date":"2019-05-22T14:41:48","date_gmt":"2019-05-22T14:41:48","guid":{"rendered":"https:\/\/lavellenetworks.com\/?p=16803"},"modified":"2021-04-15T08:52:53","modified_gmt":"2021-04-15T08:52:53","slug":"zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry","status":"publish","type":"post","link":"https:\/\/lavellenetworks.com\/blog\/zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry\/","title":{"rendered":"Zero Day Exploit: Microsoft\u2019s patch, Whatsapp\u2019s flaw and lessons from \u201cWannaCry\u201d"},"content":{"rendered":"<p>Security has always been a top concern for enterprises. As the tectonic shift to digital continues, enterprises witness both sides of a coin- transformation to new technology and other side being the constantly evolving cyber threats and attacks. Challenged to prevent enterprises from an array of security gaps in the network, enterprise security teams are up on their toes to discover, assess, and mitigate unknown cyber threats and attacks of different magnitude. Among various cybersecurity concerns, digital enterprises are compelled to pay more attention to Zero day attacks.<\/p>\n<p>&nbsp;<\/p>\n<h1 id=\"ZeroDayExploit:Microsoft\u2019spatch,Whatsapp\u2019sflawandlessonsfrom\u201cWannaCry\u201d-WhatisZerodayexploit?\"><strong>What is Zero day exploit?<\/strong><\/h1>\n<p>&nbsp;<\/p>\n<p>To put simply a Zero day exploit is a software flaw. It refers to cyberattacks that occurs on the same day the flaw is discovered in a software or hardware.\u00a0Also referred as 0-day vulnerability, these are attacks that take advantage of unpatched and private (i.e have not been made public) vulnerabilities.\u00a0Zero day exploits are hard to detect. A zero-day attack happens once a flaw, or software\/hardware vulnerability, is exploited by hackers by releasing malware before developers create a patch to fix the vulnerability\u2014hence \u201czero-day.\u201d In a Zero day attack, hackers target flaws and errors of software programmes to attack enterprise networks. This kind of issue can be reported back to the software companies, who develop patches as a quick fix to such flaws and errors.<\/p>\n<p>&nbsp;<\/p>\n<h2 id=\"ZeroDayExploit:Microsoft\u2019spatch,Whatsapp\u2019sflawandlessonsfrom\u201cWannaCry\u201d-Microsoft\u2019spatch,Whatsapp\u2019sflawandlessonsfrom\u201cWannaCry\u201d!\"><strong>Microsoft\u2019s patch, Whatsapp\u2019s flaw and lessons from \u201cWannaCry\u201d!<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>May 2017, the technology world scampered after the news of WannaCryptor broke out. If you want to feel nostalgic about your heroic efforts as the Network Security team, here is an <strong><a href=\"https:\/\/www.linkedin.com\/pulse\/wannacryptor-what-we-learned-tony-gigliotti\/\" target=\"_blank\" rel=\"noopener\">article<\/a><\/strong>\u00a0on what it was about. One of our partners \u2013 a large global technology consulting company, requested an emergency field deployment of SD-WAN to re-mediate WannaCry in their customer\u2019s network. Ironically, the incident response team was unable to make progress because the existing WAN capacity was insufficient to manage patch upgrades across the network. On average, the size of the security update issued by Microsoft is about 35MB in size. It keeps changing from Windows version to version. The details of the security patch are available\u00a0<strong><a class=\"external-link\" href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx\" rel=\"nofollow\">here<\/a>.\u00a0<\/strong>Specifically, if you look at the Microsoft security blog, the title of the article says it all \u2013 \u201c<a class=\"external-link\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2017\/05\/12\/wannacrypt-ransomware-worm-targets-out-of-date-systems\/\" rel=\"nofollow\"><strong>WannaCrypt ransomware worm targets out-of-date systems<\/strong><\/a>\u201d. The ugly truth we all were rudely awakened to is that the malware attacks all the systems that have not been patched and are classified as out of date systems.<\/p>\n<p>&nbsp;<\/p>\n<p>Recently, Microsoft released patches to address the bug (<a class=\"external-link\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0863\" rel=\"nofollow\">CVE-2019-0863<\/a>), one of 80 vulnerabilities, including 22 rated critical and 57 identified as important in severity. Above all, Microsoft urged system administrators to immediately deploy a patch for a Remote Desktop Services remote code-execution vulnerability (<a class=\"external-link\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0708\" rel=\"nofollow\">CVE-2019-0708<\/a>),\u00a0 because it was \u201cwormable\u201d flaw which could easily lead to fast-moving malware attack similar to WannaCry.\u00a0Here\u2019s an <strong><a href=\"https:\/\/threatpost.com\/microsoft-patches-zero-day\/144742\/\" target=\"_blank\" rel=\"noopener\">article<\/a> <\/strong>you can refer to know more about the flaw and the patch.\u00a0\u00a0On the other hand, WhatsApp patched a vulnerability that allowed attackers to install spyware on victims\u2019 phones. In May, the popular messaging app, owned by Facebook, discovered that attackers were installing surveillance software on iPhones and Android phones \u2013 by calling victims using WhatsApp\u2019s call function. The messaging platform which touts itself as a secure end-to-end encryption app for communications was quick to identify the flaw \u2013 now patched \u2013 as a buffer overflow vulnerability in WhatsApp\u2019s VOIP stack, which allows remote code execution via specially crafted series of SRTCP [Secure Real Time Transport Protocol] packets sent to a target phone number. Whatsapp has already released a patch, and are currently encouraging people to update the application as soon as possible.<\/p>\n<p>&nbsp;<\/p>\n<p>From the network perspective, WannaCry firstly taught enterprise IT departments to focus on patching software and upgrade to the latest security releases. And secondly, \u00a0IT engineers realized the increasing need to protect two endpoints of application communication. Unless we deploy protection and detection mechanisms at the endpoints, the network security problem in the age of Industrial revolution 4.0, cannot be solved. Enterprises must realize that why there is a lot more to do for security than just a firewall.<\/p>\n<p>&nbsp;<\/p>\n<h2 id=\"ZeroDayExploit:Microsoft\u2019spatch,Whatsapp\u2019sflawandlessonsfrom\u201cWannaCry\u201d-MitigatingandearlydetectionofZeroattacks.\"><strong>Mitigating and early detection of Zero Day attacks.<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>The primary reason why Zero Day attack takes place is twofold. First existing lapses in enterprise defense mechanism \u2013 like outdated systems, unpatched software, traditional security approaches. Secondly, longer time taken by IT teams to develop the patch, hackers benefits who get more time to develop sophisticated attacks. Traditionally, identifying the threat and hack detection relied on the database based on links and overall network, but given the advent of advance methods of hacking, enterprises require new age measures to prevent security breaches. Virtualization techniques like Sandboxing is a known method which allows enterprises to establish a highly controlled environment. It is frequently used to test unverified programs that may contain a\u00a0<a class=\"external-link\" href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_virus\" rel=\"nofollow\">virus<\/a>\u00a0or other\u00a0<a class=\"external-link\" href=\"https:\/\/en.wikipedia.org\/wiki\/Malware\" rel=\"nofollow\">malicious code<\/a>, without allowing the software to harm the host device.<\/p>\n<p>&nbsp;<\/p>\n<p>Enterprises today are working on implementing hybrid models that leverage the benefits of machine learning-based algorithmic models, cloud based networks and real time analytics. Once again, the aim here is to protect and block weak endpoints in user&#8217;s system and software, monitoring unusual program and user behavior, and ensuring secure cloud access. Almost every kind of security breach can be detected by looking at what happens to your network before and after the attack. Even the simplest of malware contacts its CnC (Command and Control center) once it is activated from an infected file. In fact, the most often implemented method in a malware sandbox solution is to look for suspicious application process or application network behavior when opening an infected file. Network flow analysis using a security lens is an invaluable and inexpensive way to stay on top of your security operations. The challenge thus far though is that the network analytics engines are mostly offline, and either need a sampled traffic or integration using flow record file formats with all your network devices. But when you deploy a cloud powered SD-WAN platform (sorry about the brazen advertising), it becomes possible to analyse all your network flows inline immediately for network behavior anomaly.<\/p>\n<p>&nbsp;<\/p>\n<p>The emerging architecture of SDP (Read our earlier primer on\u00a0<strong><a class=\"external-link\" href=\"https:\/\/lavellenetworks.com\/blog\/software-defined-perimeter-next-generation-security-for-next-generation-sd-wan\/\" rel=\"nofollow\">SDP<\/a><\/strong>) is solving key challenges for enterprises when it comes to securing their access to the cloud.\u00a0One of the key problems to solve is to get the user traffic to the SDP cloud network, and here is where the 360 degree architecture of SD-WAN &amp; SDP, which is a killer combination to protect your networks and applications. The natural strength of an SD-WAN solution is policy based on-the-fly private network overlays being created from any source to any destination, this allows an enterprise to drop in extremely simple policies to protect entire network and applications. It\u2019s an architecture where you can deploy best of breed networking and security using next generation SD-WAN and SDP.<\/p>\n<p>&nbsp;<\/p>\n<h1 id=\"ZeroDayExploit:Microsoft\u2019spatch,Whatsapp\u2019sflawandlessonsfrom\u201cWannaCry\u201d-Conclusion\"><strong>Conclusion<\/strong><\/h1>\n<p>The answer to how enterprises can seal all possible security gaps is once again is in the cloud. The natural strength of an SD-WAN solution is policy based on-the-fly private network overlays being created from any source to any destination. This allows an enterprise to drop in extremely simple policies to redirect the right traffic to the right SDP gateway. It\u2019s an architecture where you can deploy best of breed networking at your edge using\u00a0<a class=\"external-link\" href=\"https:\/\/lavellenetworks.com\/sd-wan-platform\/\" rel=\"nofollow\"><strong>next generation SD-WAN<\/strong><\/a>, and you can deploy best of breed security at your cloud using SDP.\u00a0With SD-WAN, networking team can drastically reduce the attack (like zero day) surface area to limit the scope. Enterprises can embrace necessary and new age precautions (poised with ML, AI, Cloud, etc) to avoid such vulnerable situations. A zero day attack can easily jolt the bottom line of your enterprises. Hence it is crucial for enterprise security teams to be alert and act immediately in case of any vulnerability. Here are some basic steps to maintain security hygiene that can help you mitigate Zero Day Attack:<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Deploy Advanced Security measures:\u00a0<\/strong>Traditional\/basic security measures are simply not enough in today\u2019s digital signage. Employ the most advanced means of enterprise security solutions backed with SDN\/NFV, ML, analytics.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Keeping Security Software Up-to-Date:<\/strong>\u00a0Do regular and timely software updates. This can help you effectively protect your network from a zero-day exploit.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Update Your Browsers:<\/strong>\u00a0Out-of-date browsers are common targets for hackers. A browser not updated is a potential malware threat. So keep all browsers up-to-date with the latest version.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Implementing Security Protocols:<\/strong>\u00a0Leverage policy based security architectures to set fine grained security policies based on different attributes &#8211; \u00a0parameters associated with users, devices\/switches, location, routing, services accessed in SDN, security attributes associated with the switches and Controllers in different domains.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security has always been a top concern for enterprises. As the tectonic shift to digital continues, enterprises witness both sides of a coin- transformation to new technology and other side being the constantly evolving cyber threats and attacks. Challenged to prevent enterprises from an array of security gaps in the<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":10,"featured_media":20552,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[10],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.0.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero Day Exploit: Microsoft\u2019s patch, Whatsapp\u2019s flaw and lessons from \u201cWannaCry\u201d - Lavellenetworks<\/title>\n<meta name=\"description\" content=\"Among various cybersecurity concerns, enterprises are compelled to pay more attention to Zero day attacks. Read our blog to know how can you prevent it.\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lavellenetworks.com\/blog\/zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Day Exploit: Microsoft\u2019s patch, Whatsapp\u2019s flaw and lessons from \u201cWannaCry\u201d - Lavellenetworks\" \/>\n<meta property=\"og:description\" content=\"Among various cybersecurity concerns, enterprises are compelled to pay more attention to Zero day attacks. Read our blog to know how can you prevent it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lavellenetworks.com\/blog\/zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry\/\" \/>\n<meta property=\"og:site_name\" content=\"Lavellenetworks\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-22T14:41:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-15T08:52:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Zero-Day-Exploit-Microsofts-patch-Whatsapps-flaw-and-lessons-from-WannaCry-Blog-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"7 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#website\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/\",\"name\":\"Lavellenetworks\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/lavellenetworks.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Zero-Day-Exploit-Microsofts-patch-Whatsapps-flaw-and-lessons-from-WannaCry-Blog-Image.jpg\",\"width\":1024,\"height\":512},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry\/#webpage\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry\/\",\"name\":\"Zero Day Exploit: Microsoft\\u2019s patch, Whatsapp\\u2019s flaw and lessons from \\u201cWannaCry\\u201d - Lavellenetworks\",\"isPartOf\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry\/#primaryimage\"},\"datePublished\":\"2019-05-22T14:41:48+00:00\",\"dateModified\":\"2021-04-15T08:52:53+00:00\",\"author\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#\/schema\/person\/b1a8ff9ffe087e7ab52713b8452b0d3a\"},\"description\":\"Among various cybersecurity concerns, enterprises are compelled to pay more attention to Zero day attacks. Read our blog to know how can you prevent it.\",\"breadcrumb\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lavellenetworks.com\/blog\/zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/\",\"name\":\"Blog\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry\/\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/zero-day-exploit-microsofts-patch-whatsapps-flaw-and-lessons-from-wannacry\/\",\"name\":\"Zero Day Exploit: Microsoft\\u2019s patch, Whatsapp\\u2019s flaw and lessons from \\u201cWannaCry\\u201d\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#\/schema\/person\/b1a8ff9ffe087e7ab52713b8452b0d3a\",\"name\":\"Samuel Natarajan\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/sam-146x146.jpg\",\"caption\":\"Samuel Natarajan\"},\"sameAs\":[\"https:\/\/lavellenetworks.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/16803"}],"collection":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=16803"}],"version-history":[{"count":1,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/16803\/revisions"}],"predecessor-version":[{"id":20553,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/16803\/revisions\/20553"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/media\/20552"}],"wp:attachment":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=16803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=16803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=16803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}