{"id":14551,"date":"2019-02-08T10:30:12","date_gmt":"2019-02-08T18:30:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/02\/08\/news-8301\/"},"modified":"2019-02-08T10:30:12","modified_gmt":"2019-02-08T18:30:12","slug":"news-8301","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/02\/08\/news-8301\/","title":{"rendered":"Microsoft: Watch out for zero days; deferred patches, not so much"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security5-100734739-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Fri, 08 Feb 2019 08:32:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Matt Miller\u2019s <\/span><a href=\"https:\/\/github.com\/Microsoft\/MSRC-Security-Research\/blob\/master\/presentations\/2019_02_BlueHatIL\/2019_01%20-%20BlueHatIL%20-%20Trends%2C%20challenge%2C%20and%20shifts%20in%20software%20vulnerability%20mitigation.pdf\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">presentation at Blue Hat <\/span><\/a><span style=\"font-weight: 400;\">yesterday included some startling statistics, based on data gathered by Microsoft\u2019s Security Response Center. The numbers starkly confirm what we\u2019ve been saying for years: The chances of getting hit with malware by delaying Windows and Office patches for up to 30 days is tiny compared to all the other ways of getting clobbered.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The presentation deck for his talk shows how the number of security holes (measured by <\/span><a href=\"https:\/\/cve.mitre.org\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVEs<\/span><\/a><span style=\"font-weight: 400;\">) has grown by leaps and bounds \u2014 doubling in the past five years \u2014 but the number of actual in-the-wild exploits has gone down by half in the past five years.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s a testament to both the security community\u2019s sleuthing ability and to Microsoft\u2019s improved security features \u2014 DEP, ASLR and improved sandboxing. Those technologies have been around for years, and they\u2019re gradually getting better.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For those of you in the \u201cpatch in haste, recover at leisure\u201d crowd, the numbers simply don\u2019t support the drive to install every patch immediately:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Over the past few years, only 2% to 3% of patched exploits are seen in an exploit within 30 days of the patch being distributed. Or as Miller makes clear:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is now uncommon to see a non-zero-day exploit released within 30 days of a patch being available.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More than that, the exploits these days are laser-focused on zero days.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The malware world\u2019s getting more sophisticated: The bad guys are going for zero days, not for security holes that have already been patched.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As Miller says:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If a vulnerability is exploited, it is most likely going to be exploited as zero day.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For most of us with less-than-NSA-level protection budgets, you can basically bend over and kiss your keister goodbye. One redeeming social value: The really good zero days are hoarded by countries and organizations with their own agendas. They don\u2019t care about you.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">My takeaway is the same as it\u2019s been for years: You need to patch sooner or later, but it makes no sense at all to patch the minute Microsoft pushes something out the automatic update chute.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Thx, Susan Bradley.<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">Look for more no-nonsense advice on the<\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2019\/microsoft-security-response-center-the-biggest-malware-threat-comes-from-zero-days-delayed-patches-not-so-much\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\"> AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3339537\/microsoft-windows\/microsoft-watch-out-for-zero-days-deferred-patches-not-so-much.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security5-100734739-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Fri, 08 Feb 2019 08:32:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">Matt Miller\u2019s <\/span><a href=\"https:\/\/github.com\/Microsoft\/MSRC-Security-Research\/blob\/master\/presentations\/2019_02_BlueHatIL\/2019_01%20-%20BlueHatIL%20-%20Trends%2C%20challenge%2C%20and%20shifts%20in%20software%20vulnerability%20mitigation.pdf\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">presentation at Blue Hat <\/span><\/a><span style=\"font-weight: 400;\">yesterday included some startling statistics, based on data gathered by Microsoft\u2019s Security Response Center. The numbers starkly confirm what we\u2019ve been saying for years: The chances of getting hit with malware by delaying Windows and Office patches for up to 30 days is tiny compared to all the other ways of getting clobbered.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3339537\/microsoft-windows\/microsoft-watch-out-for-zero-days-deferred-patches-not-so-much.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,10525],"class_list":["post-14551","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14551"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14551\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14551"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}