Attackers Exploited 4 Zero-Day Flaws in Chrome, Safari & IE

  /     /     /  
Publicated : 23/11/2024   Category : security


Attackers Exploited 4 Zero-Day Flaws in Chrome, Safari & IE


At least two government-backed actors -- including one Russian group -- used the now-patched flaws in separate campaigns, Google says.



The latest evidence of a troubling increase in zero-day exploit activity this year is three attack campaigns targeting four separate, previously unknown browser vulnerabilities that Google recently discovered and reported to the respective browser vendors.
Two of the exploits targeted flaws in Chrome, one targeted a vulnerability in Internet Explorer, and the fourth affected Safari. All four of the issues have been patched.
According to Google, a vendor of commercial surveillance software appears to have developed three of the exploits. At least two government-backed threat groups — one of them Russian — purchased those exploits and used them in attack campaigns before patches for the flaws became available.
Halfway into 2021, there have been 33 zero-day exploits used in attacks that have been publicly disclosed this year, Google security researchers Maddie Stone and Clement Lecigne wrote in a
blog post
this week.
That number already is 11 more than the total number of zero-day exploits for all of last year. It reflects both the increased attacker interest in finding and exploiting such vulnerabilities and the greater success researchers are having in detecting and disclosing these issues, the researchers noted.
Google researchers discovered one of the two Chrome zero-days flaws (
CVE-2021-21166
) in February and the other (
CVE-2021-30551
) in June. Exploits for both these remotely executable flaws in the Chrome renderer were delivered as one-time links via email to targeted individuals, all of whom
were
in Armenia.
Recipients who clicked on the links were directed to a webpage that was designed to harvest system information and other data such as screen resolution, time zone, language, and browser plug-ins. The data was sent in an encrypted format to the attackers controller server so the attackers could decide whether the system was worthy of further exploitation. The attack chain included an intermediate phase in which attacks collected other data, such as the CPU and OS version and CPU and BIOS information, Google said. Googles investigation of CVE-2021-21166 showed the same vulnerability existed in code shared with Apples WebKit browser engine used in iOS.
A Russian threat actor — believed to be the same one behind the SolarWinds campaign — was observed delivering an exploit for the WebKit vulnerability (
CVE-2021-1844
) in a separate
credential theft campaign
targeting governments and nongovernmental organizations in Western Europe.
Meanwhile, the fourth zero-day vulnerability that Google discovered affected Internet Explorer (
CVE-2021-33742
). Researchers from the company discovered the flaw when investigating a campaign where malicious Office documents uploaded content within IE. That campaign, too, targeted users in Armenia and involved an exploit that was likely developed by the same commercial vendor that developed exploits for the Chrome zero-days, Google said. The exploits were designed to help enable surveillance of targeted entities.
Economics of Cybersecurity
Yaniv Bar-Dayan, CEO and co-founder at Vulcan Cyber, says zero-day attacks are increasing simply because they offer the path of least resistance for threat actors. As IT security teams get better at protecting business from threat actors who exploit known vulnerabilities, these same actors are moving to sneak attack, or engineered, methods of hacking businesses, he says. We are witnessing the economics of cybersecurity at play.
Googles Stone and Lecigne point to other factors as well. The growth of mobile platforms, for instance, has resulted in increased demand for exploits against mobile devices. Similarly, there has been an increase in the number of commercial vendors selling access to zero-day exploits, they said.
Another factor is the improved detection and reporting of zero-day threats. As an example, Stone and Lecigne pointed to changes that Google and Apple have made to highlight unpatched vulnerabilities that are being exploited in the wild even if the vendor has not disclosed it itself.

Last News

▸ Feds probe cyber breaches at JPMorgan, other banks. ◂
Discovered: 23/12/2024
Category: security

▸ Security Problem Growing for Dairy Queen, UPS & Retailers, Back off ◂
Discovered: 23/12/2024
Category: security

▸ Veritabile Defecte de Proiectare a Securitatii in Software -> Top 10 Software Security Design Flaws ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Attackers Exploited 4 Zero-Day Flaws in Chrome, Safari & IE