Preprint Article Version 1 This version is not peer-reviewed

Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure

Version 1 : Received: 27 July 2024 / Approved: 29 July 2024 / Online: 29 July 2024 (16:28:25 CEST)

How to cite: Waheed, A.; Seegolam, B.; Jowaheer, M. F.; Sze, C. L. X.; Hua, E. T. F.; Sindiramutty, S. R. Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure. Preprints 2024, 2024072338. https://doi.org/10.20944/preprints202407.2338.v1 Waheed, A.; Seegolam, B.; Jowaheer, M. F.; Sze, C. L. X.; Hua, E. T. F.; Sindiramutty, S. R. Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure. Preprints 2024, 2024072338. https://doi.org/10.20944/preprints202407.2338.v1

Abstract

Zero-day threats are a more severe and constantly developing menace to various participants including large companies, government offices, and educational establishments. These entities may contain valuable information and essential operations that attract cyber attackers. These exploits are especially devastating as they target weaknesses that an organization’s vendors are not even aware of, making them have no protection against them. This paper focuses on the background and use of zero-day exploitation and the structure and technologies of these complex malware attacks. We examine two notable real-life cases: the case of ‘HAFNIUM targeting Exchange Servers with zero-day exploits’ that was investigated by Microsoft 365 Security and Microsoft Threat Intelligence, and the ‘Log4j vulnerability’ case that was reported by the National Cyber Security Centre. These cases show the critical effects of zero-day vulnerabilities and measures taken to combat them. Additionally, this paper outlines different strategies that can be used to prevent zero-day attacks with the help of modern technologies. These are fast patch release, effective IDS/IPS, and a security model that involves constant vigilance and use of behavioral analytics. Thus, by studying the lifecycle of zero-day vulnerabilities and the structure of the exploits, one can enhance the protection of the organization against the threats that are invisible to traditional security systems. This extensive survey is designed to be useful in understanding the characteristics of zero-day vulnerabilities, the technologies for their mitigation, and the constant threat and development in the field of cybersecurity. Thus, it is possible to strengthen the protection against these threats that are constant and develop with time by analyzing the previous events and predicting potential problems.

Keywords

Zero-day exploits; Cybersecurity; HAFNIUM; Log4j vulnerability; Malware defense

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.