Vulnerability Re-Exploitation


“What is old is new” – a trite saying, but often true in certain areas.  The idea of re-exploitation – when a software vulnerability is used in a new exploit or piece of malware by hackers – embodies this “what is old is new” idea. 


In recent attacks – Netwalker, Ryuk, etc. older vulnerabilities re-surfaced in the attackers’ platforms. 

Re-exploitation occurs because often organizations don’t patch or otherwise isolate systems that have a vulnerability, but instead engage in things like “virtual patching” where common malware and exploit signatures are stopped before they get to the enterprise.  However, often re-exploited vulnerabilities have a new signature – as the malware or exploit is, by definition, different. 

In today’s video, we discuss re-exploitation and show how, when you have a good source of threat intelligence and good visibility of your assets, you can get ahead of this issue. 

We see numerous organizations which are exposed to vulnerabilities that are actively being re-exploited – while at the same time focusing on certain high-ranked CVSS vulnerabilities that are not of interest to hackers.  This is both dangerous and inefficient.  Check out our recent e-book “Do More With Less” to learn how to gain efficiencies and avoid the issues of re-exploitation, reduce costs, and refocus your security program on the attackers. 


CYR3CON PR1ORITY enables customers to address re-exploitation and related issues by combining threat intelligence with machine learning to predict which of your enterprise’s vulnerabilities will be targeted by hackers. Sign-up now for our Predictive Threat Assessment.