Home » Government Hackers Pioneer Attributed Zero-Day Exploits, Google Reports

Government Hackers Pioneer Attributed Zero-Day Exploits, Google Reports

by Biz Recap Team
Government hackers pioneer attributed zero day exploits, google reports

2024 Cybersecurity Report: Government Hackers and Zero-Day Exploits

Recent findings from Google illustrate a significant trend in the landscape of cybersecurity, particularly concerning zero-day exploits. These vulnerabilities, defined as security flaws unknown to software developers at the time of their exploitation, appear to have been largely leveraged by state-sponsored hackers in the past year.

Decline in Zero-Day Exploits

The report reveals a noteworthy decrease in the total number of zero-day exploits, falling from 98 in 2023 to 75 in 2024. Despite this reduction, the analysis indicates that a significant portion of the exploits remains attributable to state-affiliated hackers. Specifically, a minimum of 23 exploits were linked to government entities.

Attribution of Exploits

Among the 23 zero-day exploits attributed to government-backed sources, ten were directly associated with hackers working for specific nations, including:

  • Five attributed to China
  • Five associated with North Korea

Additionally, eight exploits were traced back to commercial spyware firms like NSO Group, which often assert that their products are exclusively sold to governmental agencies. Notably, some of these exploits were also utilized by Serbian authorities in their operations involving Cellebrite technology.

A chart showing the distribution of zero-day exploits attributed to different sources in 2024. (Image: Google)

Impact of Spyware Makers

Clément Lecigne, a security engineer with Google’s Threat Intelligence Group, noted that many spyware companies are enhancing their operational security to mitigate exposure risks. Despite the eight documented zero-days attributed to these vendors, the study highlights the continual evolution of the surveillance industry.

James Sadowski, another principal analyst at GTIG, emphasized that as long as governmental demand persists, the market for commercial surveillance will likely expand, even in the face of legal challenges that could shutter some firms.

Cybercriminal Activity

The report revealed that 11 zero-days were probably exploited by cybercriminals, particularly those involved in ransomware attacks targeting enterprise devices such as VPNs and routers. Furthermore, it was identified that most of the 75 zero-days were aimed at consumer platforms, including mobile devices and web browsers, rather than corporate equipment.

Improvements in Security Practices

On a positive note, Google’s report indicated that software developers are increasingly fortifying their products against zero-day attacks. “We are observing significant reductions in exploitation of historically popular targets, such as browsers and mobile operating systems,” Sadowski stated.

The integration of features like Lockdown Mode in iOS and macOS, designed to bolster device security, has proven effective against government-sponsored cyber threats. Additionally, modern Google Pixel devices utilize Memory Tagging Extension (MTE), enhancing their ability to detect vulnerabilities and improve overall security.

Conclusion

Research conducted by Google plays a crucial role in illuminating the practices of government hackers and the overarching trends in cybersecurity. Although zero-day exploits remain a concern, advancements in security measures may help mitigate their impact, providing vital insights into both hacker behavior and defensive capabilities.

Source link

You may also like

About Us

Welcome to BizRecap, your ultimate destination for comprehensive business and market news. At BizRecap, we believe that staying informed is the cornerstone of success in today’s fast-paced world. Our mission is to deliver accurate, insightful, and timely updates across all topics related to the business and financial landscape.

Copyright ©️ 2024 BizRecap | All rights reserved.