Why Nostr? What is Njump?
2023-09-08 15:12:01
in reply to

Taggart :donor: on Nostr: npub1623w6…vkfjx I am a threat hunter, not an intel analyst, however I would point ...

I am a threat hunter, not an intel analyst, however I would point out a couple things here.

First, MOVEIt exploiters were mostly ransomware actors, who will buy 0-days, but not necessarily develop them.

There's a temporal component here as well. I'd have to check the numbers, and it's still early, but it doesn't seem like there's a massive uptick in network device 0-days being released since MOVEIt, which makes sense, given the amount of R&D a brand new 0-day usually takes to develop.

It's also the case that cl0p et al were not specifically targeting tech companies with MOVEIt.

I suppose it's possible that successful compromise of some vendors led to the discovery of undisclosed critical vulns, but that seems like a rarity.

The increased development of network appliance 0-days has been business-as-usual for a while now—at least since CVE-2019-19781 (original Netscaler RCE).
Author Public Key
npub1ftansv8hchdst4vngsu808mrc0k3gqd2qw3wkrxrekn5xce6afss2k87qx