Quantifying the Attacker's First-Mover Advantage

I. EXECUTIVE SUMMARY This report measures the difference in days between when an exploit for a vulnerability becomes publicly available (Time to Exploit Availability) and when a vulnerability is first assessed (Time to Assess). A negative delta indicates that the attacker has an opportunity to exploit a vulnerability before the defender is even aware of the risk. The sample set used for this analysis is based on the 50 most prevalent vulnerabilities from nearly 200,000 unique vulnerability assessment scans. Findings: 7-day 76% 24% 75% Attackers have a median sevenday window of opportunity to exploit a vulnerability before a defender is even aware they are vulnerable. A further point of concern is that 24 percent of analyzed vulnerabilities were being actively exploited by malware, ransomware or exploit kits in the wild. of analyzed vulnerabilities had a negative delta – meaning the attacker has the first-mover advantage. 34% For 34 percent of the analyzed vulnerabilities, an exploit was available on the same day that the vulnerability was disclosed. While improving the Time to Assess by 75 percent would result in a positive delta for 66 percent of the analyzed vulnerabilities, the rapid Time to Exploit Availability and its weaponization mean that defenders often begin on a back footing and are challenged to gain the lead in the first move. Recommendations: • Use continuous vulnerability assessments to effectively improve the Time to Assess – but this by itself cannot fully mitigate the resulting exposure gap. • Vulnerabilities and exploits are discovered and published incessantly, and attacks and threats evolve at a rapid pace and can strike at any time. The objective of an effective vulnerability management program must be to quickly adapt and react to these changing circumstances. A start-stop or cyclical model falls short in achieving this objective, requiring instead a vulnerability management approach based on a continuous integration and delivery (CI/CD) model. • Align operational processes to support rapid response and ad hoc remediation and mitigation requests outside of regular maintenance and patch windows. • Focus remediation and prioritization efforts on vulnerabilities with publicly available exploits and those actively being targeted by malware, exploit kits and ransomware. This necessitates up-to-date situational awareness and threat context. Quantifying the Attacker’s First-Mover Advantage 3 II. INTRODUCTION This research report examines the difference in time between when a public exploit for a vulnerability is published and when users actively assess it. These two events represent the first move the attacker and defender make. The premise of this paper is that this delta is an indicative metric in determining Cyber Exposure. The sample set is based on the analysis of real-world vulnerability assessment data from nearly 200,000 unique vulnerability assessment scans. We selected the 50 most prevalent critical and high-severity vulnerabilities from this data set for this report. A basic understanding of how vulnerabilities are researched, assessed and exploited is assumed. III. QUANTIFYING THE ATTACKER’S FIRST-MOVER ADVANTAGE Security professionals are engaged in a continuous arms race with threat actors. In relation to vulnerabilities, this arms race is between attackers’ access to exploits and defenders’ ability to assess, remediate and mitigate them. The attackers gain and maintain the advantage if they can stay at least one step ahead of the defender, resulting in a window of exposure. The race is never-ending and begins again with every new vulnerability discovered. The finish line keeps shifting, with the attacker setting the pace. Figure 1 outlines attackers’ and defenders’ first moves after a vulnerability is disclosed. Figure 1. Attackers and Defenders First Moves Post-Vulnerability Disclosure Quantifying the Attacker’s First-Mover Advantage 4
Please complete the form to gain access to this content