• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Network   »   TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 21, 2016

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 21, 2016

  • Posted on:March 25, 2016
  • Posted in:Network, Security
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0

According to Google, the word “superstition” is defined as a “widely held but unjustified belief in supernatural causation leading to certain consequences of an action or event, or a practice based on such a belief.” I consider myself rather superstitious, and you’ll often see me knocking on wood, not walking under a ladder, or making sure my lucky red luggage tag is in place when I’m traveling. Do they work all the time? Not 100 percent but close enough, I tell myself. So why do I still do my little rituals? Perhaps you can attribute my behavior to the theory attributed to American psychologist and behaviorist B.F. Skinner called the “partial reinforcement effect.” Unlike Ivan Pavlov, who discovered the concept of classical conditioning (remember Pavlov’s dog?), B.F. Skinner found that by reinforcing an organism only sometimes and not every time a desired behavior occurs, that organism is more resistant to extinction than an organism that receives reinforcement every time. Basically, I am going to live forever because I am able to develop a tolerance for frustration and adapt in an unpredictable world. But I digress…

I learned about a new superstition last week on a fishing trip with the TippingPoint DVLabs and Zero Day Initiative teams. As we were boarding the boat, the captain noticed that a ship next to us had bananas on it and told us that they are bad luck. We also had bananas on our boat, but got rid of them before we cruised off into the water. There are numerous reasons why fishermen believe bananas are bad luck, but the one that seemed the most reasonable to me stems from the 1700s. The wooden sailing boats of that time had to move quickly to deliver bananas before they spoiled and fishermen had a hard time trying to fish on such fast-moving boats. While we were on a more modern boat with a very fast gas engine, the centuries-old bananas superstition unleashed its fury on our fishing poles. There would be no fish for us that day; however, we had our own “Prawn2Own” event and caught a large batch of prawns and crabs. We even had an octopus join the party!

TP-FriBlog_Week of 032116_Page_1

At the Pwn2Own event last week in Vancouver, not even a lucky rabbit’s foot could keep vendors immune from the vulnerabilities that were discovered during the contest. After all was said and done, our Zero Day Initiative awarded $460,000 USD to researchers for a total of 21 vulnerabilities across Adobe, Apple, Google and Microsoft products. The winners of the competition, Tencent Security Team Sniper (KeenLab and PC Manager), received a total of $142,500 USD, a snazzy ZDI “Master of Pwn” smoking jacket and an impressive ZDI trophy. But what we get in return is priceless: We get the vulnerability information first and protect our TippingPoint customers before anyone else! Congratulations to Tencent Security Team Sniper (KeenLab and PC Manager) for being named the “Master of Pwn” and congratulations to the Zero Day Initiative and DVLabs for a great event!

 

TP-FriBlog_Week of 032116_Page_3_Page_2

 

Here are some videos and blogs to get you updated on all the details and action from last week!

  • Blog: Pwn2Own 2016 – Trend Micro TippingPoint DVLabs Exclusive Zero Day Coverage! (March 21, 2016)
  • Blog: Pwn2Own Day 2 and Event Wrap-Up (March 18, 2016)
  • Video: Pwn2Own Day 2 and Event Wrap-Up (March 18, 2016)
  • Blog: Pwn2Own: Day 1 Recap (March 17, 2016)
  • Video: Pwn2Own Day 1 Recap (March 17, 2016
  • Blog: Pwn2Own 2016 Has Begun (March 16, 2016)
  • Video: Pwn2Own 2016 Teaser (March 15, 2016)
  • Blog: Zero Day Initiative Announces Pwn2Own 2016 (March 9, 2016)

We also garnered significant press as a result of the event, with over 95 articles from 23 countries so far! Here’s a quick sampling of the articles generated as a result of the event:

  • NetworkWorld: Safari, Chrome and Flash Player hacked during first day at Pwn2Own, some of them twice
  • Threatpost: Pwn2Own Day Two: Safari, Edge Go Down And Winner Crowned
  • CSO Online: Pwn2Own contest highlights renewed hacker focus on kernel issues
  • ITWire: 12 new vulnerabilities demonstrated in 15 minutes

Zero-Day Filters

There are 15 new zero-day filters covering four vendors this week. The 10 zero-day filters listed below in green are from this year’s Pwn2Own contest. A number of existing filters in this week’s package were modified to update the filter description, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative web site.

Vendor: Adobe (6)

  • 23974: ZDI-CAN-3507: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
  • 23975: ZDI-CAN-3508: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
  • 24019: ZDI-CAN-3522: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
  • 24020: ZDI-CAN-3523: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
  • 24022: PWN2OWN ZDI-CAN-3616: Zero Day Initiative Vulnerability (Adobe Flash)
  • 24027: PWN2OWN ZDI-CAN-3608: Zero Day Initiative Vulnerability (Adobe Flash)

Vendor: Apple (3)

  • 24021: PWN2OWN ZDI-CAN-3604: Zero Day Initiative Vulnerability (Apple Safari)
  • 24026: PWN2OWN ZDI-CAN-3610: Zero Day Initiative Vulnerability (Apple Safari)
  • 24032: PWN2OWN ZDI-CAN-3619: Zero Day Initiative Vulnerability (Apple Safari)

Vendor: Google (4)

  • 24023: PWN2OWN ZDI-CAN-3612: Zero Day Initiative Vulnerability (Google Chrome)
  • 24024: PWN2OWN ZDI-CAN-3613: Zero Day Initiative Vulnerability (Google Chrome)
  • 24025: PWN2OWN ZDI-CAN-3614: Zero Day Initiative Vulnerability (Google Chrome)
  • 24033: ZDI-CAN-3623: Zero Day Initiative Vulnerability (Google Chrome)

Vendor: Microsoft (2)

  • 24031: PWN2OWN ZDI-CAN-3621: Zero Day Initiative Vulnerability (Microsoft Edge)
  • 24034: PWN2OWN ZDI-CAN-3626: Zero Day Initiative Vulnerability (Microsoft Edge)

Related posts:

  1. TippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 31, 2016
  2. TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 19, 2018
  3. TippingPoint Threat Intelligence and Zero-Day Coverage – Week of December 26, 2016
  4. TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 28, 2016

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.