{"id":48995,"date":"2023-09-12T06:01:20","date_gmt":"2023-09-12T10:01:20","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=48995"},"modified":"2023-09-12T06:01:20","modified_gmt":"2023-09-12T10:01:20","slug":"zero-day-threats-video","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/zero-day-threats-video\/48995\/","title":{"rendered":"Zero-day: Birth of a new threat"},"content":{"rendered":"<p>They\u2019re inside your system but no one knows how they got there \u2013 or how to stop them. These destructive attacks are called zero-day threats, because your security team will have zero days to prepare.<\/p>\n<p>Zero-day attacks involve cybercriminals using vulnerabilities no one knows about. They\u2019re hard to detect and can go on for years.<\/p>\n<p>Zero-day: Birth of a New Threat is <a href=\"https:\/\/www.youtube.com\/c\/TomorrowUnlocked\" target=\"_blank\" rel=\"noopener nofollow\">Tomorrow Unlocked<\/a>\u2018s latest film in the hacker:HUNTER Behind the Screens series. Michael Gregg, CEO of Managed Service Provider <a href=\"https:\/\/www.catalyst-solutions.ca\/\" target=\"_blank\" rel=\"noopener nofollow\">Catalyst Network Solutions<\/a>, discusses these attacks and his clever way to trick cybercriminals into giving up their secrets. He also shares ways to spot these sometimes-subtle attacks.<\/p>\n<h2>Understanding zero-day attacks<\/h2>\n<p>While you may not have heard of zero-day attacks, some of the most well-known cyberattacks fall into this category, such as <a href=\"https:\/\/softwarelab.org\/blog\/zero-day-exploit-examples\/\" target=\"_blank\" rel=\"noopener nofollow\">WannaCry and BlueKeep<\/a>. But what does it mean?<\/p>\n<p>Software developers are always looking out for vulnerabilities hackers could use to gain access to systems through their software. When you receive software updates, these often include \u2018patches\u2019 for recently discovered security holes.<\/p>\n<blockquote><p>Cybercriminals sometimes spot vulnerabilities before developers \u2013 these are known as zero-day vulnerabilities. When they find these holes, hackers write code to use and sell to other hackers so they can steal data.<\/p>\n<\/blockquote>\n<p>\u201cIt\u2019s called zero-day because that\u2019s exactly how long you\u2019ve had to prepare for it,\u201d says Gregg.<\/p>\n<p>Zero-day attacks might include reaching a vulnerable system using <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/heathrow-airport-cybersecurity-education\/44618\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing<\/a> \u2013 manipulative emails to users aiming to convince them to open a file or visit a malicious site. That action downloads the attacker\u2019s malware, which infiltrates user files.<\/p>\n<p>It can take time for developers to find the vulnerability that allowed the attack. In recent years, hackers have become faster at exploiting vulnerabilities soon after discovery.<\/p>\n<p>Zero-day attacks are especially dangerous because only attackers know about them. Once they have access through a zero-day vulnerability, criminals can attack immediately or wait for the best time.<\/p>\n<h2>What is a Managed Service Provider (MSP?)<\/h2>\n<p>Gregg\u2019s company, Catalyst Network Solutions, is a Kaspersky partner Managed Service Provider (MSP.) MSPs offer cybersecurity-as-a-service.<\/p>\n<p>Rather than or as well as an inhouse cybersecurity team, businesses hire MSPs to take care of their cybersecurity. Using MSPs makes it easier for businesses to have a range of cybersecurity expertise on-hand in a market where <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/technology-skills-gap\/31975\/\" target=\"_blank\" rel=\"noopener nofollow\">hiring cyber experts can be <\/a><a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/technology-skills-gap\/31975\/\" target=\"_blank\" rel=\"noopener nofollow\">challenging<\/a>.<\/p>\n<p>MSPs typically provide services to multiple companies and organizations, giving them broad-based knowledge of cyberthreats and cyber solutions. With the wide range of business tech that needs securing today \u2013 from <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/video-series\/why-hack-a-fridge\/44634\/\" target=\"_blank\" rel=\"noopener nofollow\">light switches to security cameras to fridges<\/a> \u2013 the value of wide-ranging experience is rising by the day.<\/p>\n<h2>Tricking cybercriminals with their own tricks<\/h2>\n<blockquote><p>To help prevent zero-day attacks, Gregg built an online test environment (sandbox) containing fake data that would be attractive to cybercriminals \u2013 such as numbers that looked like social security and credit card details.<\/p>\n<\/blockquote>\n<p>The data tricks cybercriminals into using, and so revealing, their zero-day methods. This has allowed Gregg\u2019s team to prevent and stop attacks faster.<\/p>\n<h2>Preventing zero-day attacks<\/h2>\n<p>As soon as a zero-day threat is understood, software developers will release updates to patch it, so your business should ensure it always installs updates promptly.<\/p>\n<p>If you can\u2019t stop a zero-day attack happening, there are ways to ensure it\u2019s caught early. Gregg advises \u201cThere\u2019s never a call that\u2019s not worth making,\u201d when it comes to cybersecurity.<\/p>\n<p>Signs of zero-day attacks can be subtle. \u201cIf your mouse is moving in a weird way, you\u2019re getting out-of-place keystrokes or your computer\u2019s running slowly,\u201d let the cyber professionals know \u2013 whether you have an internal team or a Managed Service Provider.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hard-to-detect, destructive zero-day threats involve cybercriminals using vulnerabilities no one knows about. One security expert has a way to stop them.<\/p>\n","protected":false},"author":2521,"featured_media":48996,"template":"","coauthors":[3452],"class_list":{"0":"post-48995","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-data-breaches","7":"emagazine-category-enterprise-cybersecurity","8":"emagazine-category-threat-intelligence","9":"emagazine-tag-managed-service-providers","10":"emagazine-tag-tomorrow-unlocked","11":"emagazine-tag-video"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/zero-day-threats-video\/48995\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/zero-day-threats-video\/28899\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/48995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/48996"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=48995"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=48995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}