{"id":12900,"date":"2025-10-28T15:43:47","date_gmt":"2025-10-28T06:43:47","guid":{"rendered":"https:\/\/www.filingcloud.com\/blog\/software-vulnerability-and-malware-attacks-an-international-standard-itu-t-x-1220-that-defends-both-simultaneously\/"},"modified":"2025-10-29T10:11:42","modified_gmt":"2025-10-29T01:11:42","slug":"software-vulnerability-and-malware-attacks-an-international-standard-itu-t-x-1220-that-defends-both-simultaneously","status":"publish","type":"post","link":"https:\/\/www.filingcloud.com\/en\/blog\/software-vulnerability-and-malware-attacks-an-international-standard-itu-t-x-1220-that-defends-both-simultaneously\/","title":{"rendered":"Software Vulnerability and Malware Attacks \u2014 An International Standard ITU-T X.1220 That Defends Both Simultaneously"},"content":{"rendered":"\n<p><\/p>\n\n<p class=\"has-text-align-right\">Jonghyun Woo <\/p>\n\n<p class=\"has-text-align-right\">Editors of ITU-T X.1220<\/p>\n\n<h3 class=\"wp-block-heading\">Summary<\/h3>\n\n<p>Among cyber attacks, the two that security teams and operations teams should pay the most attention to are software vulnerability attacks and malware attacks. In this article we examine how large a portion these two attack types occupy in overall cyber attacks and introduce a new international standardized technology that can defend against both simultaneously. Through this we propose a method to build an additional defense layer beyond existing network and endpoint protection systems to prepare for unknown cyber attacks (such as zero-day attacks). In other words, we present measures to keep critical data safe even if attacks abusing undiscovered vulnerabilities or malware in forms that evade detection occur.   <br\/><\/p>\n\n<h3 class=\"wp-block-heading\">Types of Cyber Attacks and Defense Systems by Type<\/h3>\n\n<p>Recently, a variety of cyber attacks targeting telecommunications companies, medical institutions, and government agencies have been occurring one after another. These cyber attacks can be broadly classified into four categories based on their operational methods. <\/p>\n\n<p>1. Software vulnerability attacks<br\/>2. Malware attacks<br\/>3. Phishing attacks<br\/>4. DDoS (Distributed Denial of Service) attacks<\/p>\n\n<p>Among these, <strong>software vulnerability attacks<\/strong> exploit flaws in operating systems or business applications we use, allowing the attacker to take over administrator privileges. Through these flaws an attacker secures administrator rights on a PC or server and executes commands as if they were a legitimate user. As a result, they can exfiltrate internal data or encrypt it (ransomware), causing damage. PC or server operators must regularly apply patches and updates to defend against this, but in practice software vendors often cannot provide patches quickly, and there are many cases exploiting zero-day vulnerabilities that have not yet been publicly disclosed.   <\/p>\n\n<p>The second attack type is <strong>malware<\/strong>. Malware attacks infect systems with malicious programs and continuously perform malicious actions in the background. Attackers distribute malicious code via email attachments, malicious links, drive-by downloads, etc., and the infected devices can cause various harms such as data leakage, information collection, remote control, and keylogging. Particularly, advanced malware uses evasion techniques such as obfuscation or rootkits to bypass antivirus and security solutions, making detection and removal difficult.   <\/p>\n\n<p>The third is <strong>phishing<\/strong>. Phishing is a social-engineering attack technique that impersonates a trusted sender or service to steal personal information or authentication credentials. Attackers deceive users via email, SMS, messengers, or fake login pages to induce entry of passwords, OTPs, card information, or to install malware. Because phishing targets \u201chuman trust\u201d rather than a technical vulnerability, it is easy to be careless; targeted (spear-phishing) attacks in particular have higher success rates and larger impacts. Efforts such as applying strong authentication methods, preblocking suspicious links, regular security training, and phishing simulation drills aim to reduce user vulnerabilities, but ultimately it is impossible to completely prevent users from being deceived by attackers.     <\/p>\n\n<p>Finally, <strong>DDoS attacks<\/strong> concentrate excessive traffic on a specific server or service using many distributed devices, making normal service provision impossible. Attackers exploit botnets or cloud resources to saturate network bandwidth or consume application resources, reducing service availability. <br\/>Large-scale DDoS attacks can cause service outages, financial loss, and reputational damage for businesses. To mitigate this, traffic scrubbing and filtering, edge CDNs, or cloud-based mitigation services can be applied, but it is impossible to preemptively block all excessive traffic that comes in over public networks. <\/p>\n\n<p class=\"has-text-align-center\"><\/p>\n\n<br\/><figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Category<\/td><td>Main techniques<\/td><td>Main targets<\/td><td>Objective (Outcome)<\/td><td>Defense methods<\/td><td>Proportion<\/td><\/tr><tr><td>Software vulnerabilities<\/td><td>Exploit vulnerability \u2192 privilege escalation<\/td><td>Servers \u00b7 Cloud \u00b7 Applications<\/td><td>Steal admin privileges \u2192 internal access<\/td><td>Patch \/ Update<\/td><td>25%<\/td><\/tr><tr><td>Malware (ransomware)<\/td><td>Install \/ execute malicious code<\/td><td>Personal PCs \u00b7 Servers \u00b7 Medical devices<\/td><td>Data encryption \u00b7 Data exfiltration \u00b7 Monetary demands<\/td><td>Anti-virus \/ EDR<\/td><td>30%<br\/><\/td><\/tr><tr><td>Phishing \u00b7 Social engineering<\/td><td>Deceptive emails \/ messages<\/td><td>Employees \u00b7 User accounts<\/td><td>Account takeover \u2192 internal intrusion<\/td><td>Phishing-resistant MFA<\/td><td>40%<\/td><\/tr><tr><td>DDoS<\/td><td>High-volume traffic attacks<\/td><td>Services \u00b7 Web portals<\/td><td>Service outage \u00b7 Business interruption<\/td><td>Traffic scrubbing<\/td><td>5%<br\/><\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Summary table of the four major categories of cyber attacks<br\/><\/figcaption><\/figure><br\/>\n\n<p><\/p>\n\n<p>Among the four attack types, rather than focusing primarily on preparing for phishing attacks that deceive employees or DDoS attacks that send traffic over public networks, it is more realistic for security officers and system operators to prepare for software vulnerability attacks and malware attacks. Especially because these two types together account for more than half of all cyber attacks, strengthening defenses in these areas is the most effective way to raise overall security posture. <br\/><\/p>\n\n<h3 class=\"wp-block-heading\">Limitations of Existing Defense Systems and Establishment of a New Defense Standard<\/h3>\n\n<p>What security officers and system operators currently use as preventive measures are constant updates to minimize software security vulnerabilities and adding network protection and endpoint protection to shield systems. However, these systems can only develop patches or block attacks if they \u201calready know about the vulnerability, malware, or intrusion behavior.\u201d A blacklist approach that blocks known attacks cannot prevent newly appearing vulnerabilities, malware, or intrusion behaviors.   <\/p>\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"417\" src=\"https:\/\/www.filingcloud.com\/wp-content\/uploads\/\/image-4-1024x417.png\" alt=\"\" class=\"wp-image-12885\" srcset=\"https:\/\/www.filingcloud.com\/wp-content\/uploads\/image-4-1024x417.png 1024w, https:\/\/www.filingcloud.com\/wp-content\/uploads\/image-4-300x122.png 300w, https:\/\/www.filingcloud.com\/wp-content\/uploads\/image-4-768x313.png 768w, https:\/\/www.filingcloud.com\/wp-content\/uploads\/image-4.png 1336w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n<p>Theoretically, a whitelist approach can be used so that only \u201cregistered network packets\u201d or \u201callowed programs\u201d operate, but it is practically very difficult to run a whitelist on network nodes shared across all systems or on endpoints where many pieces of software run. It is impossible to predict how a system\u2019s network packets might change, and with operating system patches being released daily, re-registering everything each time is inefficient. <\/p>\n\n<p>Therefore, even if security officers or system administrators consistently apply updates to protected systems, keep antivirus signatures up to date, and monitor network traffic as part of a layered defense, an attacker who exploits a software vulnerability unknown to us, attacks while a patch is being prepared, develops new malware that circumvents existing antivirus inspection, or distributes malware that operates in new behavioral modes to evade behavior-based detection engines may still cause theft or encryption of valuable data.<\/p>\n\n<p>To solve this problem, the ITU-T, an international standardization body under the UN, established a new storage protection approach as an international standard \u2014 ITU-T X.1220 \u2014 that applies whitelist access control at the storage layer where data is stored, rather than at shared network or endpoint layers. <\/p>\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"238\" src=\"https:\/\/www.filingcloud.com\/wp-content\/uploads\/\/image-3-1024x238.png\" alt=\"\" class=\"wp-image-12883\" srcset=\"https:\/\/www.filingcloud.com\/wp-content\/uploads\/image-3-1024x238.png 1024w, https:\/\/www.filingcloud.com\/wp-content\/uploads\/image-3-300x70.png 300w, https:\/\/www.filingcloud.com\/wp-content\/uploads\/image-3-768x179.png 768w, https:\/\/www.filingcloud.com\/wp-content\/uploads\/image-3.png 1027w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n<p>This technology is placed between endpoints and storage; whenever a program running on an endpoint requests data, it checks whether that program is pre-registered. Registered programs can read and write the real data, while unregistered programs can only access fake data. <\/p>\n\n<p>If an unregistered program requests data, read-only fake data is provided. In other words, even if an attacker runs an exploit or malware on a PC or server to steal or encrypt files within the storage protection system, they cannot access the real data. <\/p>\n\n<p>Most importantly, when a security officer or system operator registers an allowed program, they must input an OTP code from the PC or server so that a malicious program cannot be arbitrarily registered. Therefore, even if an endpoint is already compromised by an attacker, any program not registered via OTP cannot encrypt or delete data. <\/p>\n\n<p>Thus, even when attacks exploiting unknown vulnerabilities or new malware attacks occur, data stored in storage protection remains safe because only allowed programs can access it.<\/p>\n\n<h3 class=\"wp-block-heading\">A New Cyber Defense Paradigm Extended by Storage Protection<\/h3>\n\n<p>Given that software vulnerability and malware attacks constitute more than half of all cyber attacks, the long-standing lack of fundamental countermeasures for these attacks has been pointed out as a structural limitation of cyber security. In this context, the UN-affiliated international standardization body presenting a new alternative capable of dealing with unknown attacks represents a meaningful advance. <\/p>\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"449\" src=\"https:\/\/www.filingcloud.com\/wp-content\/uploads\/\/image-5-1024x449.png\" alt=\"\" class=\"wp-image-12887\" srcset=\"https:\/\/www.filingcloud.com\/wp-content\/uploads\/image-5-1024x449.png 1024w, https:\/\/www.filingcloud.com\/wp-content\/uploads\/image-5-300x131.png 300w, https:\/\/www.filingcloud.com\/wp-content\/uploads\/image-5-768x336.png 768w, https:\/\/www.filingcloud.com\/wp-content\/uploads\/image-5.png 1253w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n<p>To prepare for the increasingly evolving nature of cyber attacks, a new perspective is needed that considers security at the storage layer in addition to defense-centric approaches at the network and endpoint layers. If storage is designed not as a simple data repository but as a final line of defense that attacks cannot pass through, it can complement data areas that conventional security systems have failed to address. <\/p>\n\n<p>Going forward, we should continue to develop and expand this whitelist-based data access control model so it can be enhanced to block both vulnerability attacks and malware attacks at the storage level \u2014 effectively creating a new \u201csecurity genre.\u201d This will be more than the adoption of a single technology; it will be the first step toward fundamentally transforming the paradigm of cyber security. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jonghyun Woo Editors of ITU-T X.1220 Summary Among cyber attacks, the two that security teams and operations teams should pay the most attention to are software vulnerability attacks and malware attacks. In this article we examine how large a portion these two attack types occupy in overall cyber attacks and introduce a new international standardized [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":7499,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10],"tags":[],"class_list":["post-12900","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news"],"jetpack_featured_media_url":"https:\/\/www.filingcloud.com\/wp-content\/uploads\/4567.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/posts\/12900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/comments?post=12900"}],"version-history":[{"count":1,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/posts\/12900\/revisions"}],"predecessor-version":[{"id":12901,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/posts\/12900\/revisions\/12901"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/media\/7499"}],"wp:attachment":[{"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/media?parent=12900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/categories?post=12900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filingcloud.com\/en\/wp-json\/wp\/v2\/tags?post=12900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}