Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Government hackers are leading the use of attributed zero-days, Google says


The hackers working for governments were responsible for the majority of zero-day-long-day operations used in cyber-war in the real world last year New Studies from Google.

Google’s report has the number of zero day The use – In 2023, in 2023, from zero to 75 to 75 years of zero in 2023, the 75,000 operators were reported in the 75-year-old-23 zero-day operators.

Between 23 operations, 10 zero days, including haberns, including Haberns, including Chinese and other five to five maintenance related to North Korea.

Determined as developed by eight exploits Spyware manufacturers Opportunity to control as a NSO group that usually claims to sell only to governments. Between these eight exploits developed by spyware companies, Google is also considered wheat It was Recently exploited Cellebrite uses unlocked devices by Serbian officials.

A zero-zero-zero graph, which is the other 8 zero days of state-funded spying (from 5 to 5 and 5 to 5 and 5 to 5) and the other 8 zero.
A table showing the zero day exploits belonging to 2024. (Photo: Google)

Despite the eight-day zero-resistant work performed by the Zari-day zero (GTIG) in the Google Threatening Prison Group (GTIG), a resistant of the resistant (GTIG), which invests more funds in operating security. ”

Google added that control vendors continue to spread.

“In cases where the vendors of law enforcement or public disclaimers are dismissed, we have seen new vendors to provide similar services,” he said. “Industry will continue to grow, when government customers continue to pay and pay for these services.”

The remaining 11 resisted zero days, probably exploited by cybercriminals such as ransomware operators Targets enterprise devicesincluding vpns and routers.

In the report, the majority of consumer platforms and products such as the majority of total 75 zero of zero operated in 2024, telephone and browser; The remaining exploited devices are usually found on corporate networks.

According to Google’s report, the good news, software manufacturers who protect against zero-day attacks, make users find the bugs more difficult to find bugs.

“According to the report, some historically popular targets such as browsers and mobile operating systems have seen the exploitation of zero days.

Sadowski pointed out special Locking modeA special feature for iOS and MacOS, which eliminates certain functionality with the target of mobile phones and computers that tightens proven mobile phones and computers follow record to stop government hackers; also Memory label extension (MTE), security feature of modern Google Pixel chipsets that help identify identified errors and improve the safety of the device.

As Google’s reports, because this is how zero-day works, and some of those who do not detect, and some, while others are, including some, and some are their own.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *