Article Details
Scrape Timestamp (UTC): 2024-02-06 17:31:54.239
Original Article Text
Click to Toggle View
Google says spyware vendors behind most zero-days it discovers. Commercial spyware vendors (CSV) were behind 80% of the zero-day vulnerabilities Google's Threat Analysis Group (TAG) discovered in 2023 and used to spy on devices worldwide. Zero-day vulnerabilities are security flaws the vendors of impacted software do not know about or for which there are no available fixes. Google's TAG has been following the activities of 40 commercial spyware vendors to detect exploitation attempts, protect users of its products, and help safeguard the broader community by reporting key findings to the appropriate parties. Based on this monitoring, Google has found that 35 of the 72 known in-the-wild zero-day exploits impacting its products over the last ten years can be attributed to spyware vendors. Those spyware vendors use the zero-day flaws to target journalists, activists, and political figures as directed by their customers, including governments and private organizations. Some notable CSVs highlighted in Google's report are: These vendors sell licenses to use their products for millions of dollars, allowing customers to infect Android or iOS devices using undocumented 1-click or zero-click exploits. Some of the exploit chains utilize n-days, which are known flaws for which fixes are available, yet patching delays still make them exploitable for malicious purposes, often for extended periods. Google says that CSVs have grown very aggressive in their hunt for zero-days, developing at least 33 exploits for unknown vulnerabilities between 2019 and 2023. In the appendix of Google's detailed report, one can find a list of 74 zero-days used by 11 CSVs. Of those, the majority are zero-days impacting Google Chrome (24) and Android (20), followed by Apple iOS (16) and Windows (6). When white-hat researchers discover and fix the exploited flaws, CSVs often incur significant operational and financial damage as they struggle to reconstruct a working alternative infection pathway. "Each time Google and fellow security researchers discover and disclose new bugs, it causes friction for CSVs and costs them development cycles," says Google. "When we discover and patch vulnerabilities used in exploit chains, it not only protects users, but prevents CSVs from meeting their agreements to customers, preventing them from being paid, and increasing their costs to continue operating." However, this is not enough to stop the proliferation of spyware, as the demand for these tools is strong, and the contracts are too lucrative for CSVs to give up. Google calls for more action to be taken against the spyware industry, including higher levels of collaboration among governments, the introduction of strict guidelines that govern the use of surveillance technology, and diplomatic efforts with countries hosting non-compliant vendors. Google is proactively countering spyware threats through solutions like Safe Browsing, Gmail security, the Advanced Protection Program (APP), and Google Play Protect, as well as by maintaining transparency and openly sharing threat information with the tech community.
Daily Brief Summary
Commercial spyware vendors are responsible for 80% of zero-day vulnerabilities discovered by Google's Threat Analysis Group in 2023.
Google has monitored 40 spyware vendors, tracing 35 of the 72 zero-day exploits affecting its products in the last decade back to these vendors.
The majority of the zero-days impact Google Chrome and Android, followed by Apple iOS and Windows.
Spyware vendors target high-profile individuals, such as journalists and political figures, and sell exploit licenses for millions of dollars.
Zero-day hunting has become increasingly aggressive, with spyware vendors developing at least 33 exploits for unknown vulnerabilities between 2019 and 2023.
Google's discovery and patching of vulnerabilities impose significant costs on spyware vendors, disrupting their operations and financial models.
Despite challenges, spyware remains in demand with lucrative contracts, prompting Google to call for greater global action against spyware proliferation.
Google combats spyware threats through its security initiatives like Safe Browsing, Gmail security features, the Advanced Protection Program, and Google Play Protect, while maintaining transparency in sharing threat intelligence.