Report disclosure
In the security report, Google reveals more than 60 disclosures since 2016 against Apple, Adobe, Google, Microsoft and Mozilla productszero-day exploitFor commercial usespywareRelated to multiple commercial spyware service providers.
spyware vendor
The security report provides an in-depth analysis of the operations of spyware service providers that help the government install spyware on devices. These commercialSpyware vendorsClaiming that their products and services are used only for legitimate surveillance, usually for law enforcement purposes, numerous investigations have shown that they are used against political opponents, journalists, dissidents and human rights defenders.
Commercial spyware vendors are prepared to pay millions of dollars for exploits that give them complete control over devices, especially phones running Android and iOS, but these companies also make millions of dollars from individual customers. In addition to the spyware itself, customers get an initial delivery mechanism and the required exploit programs, command and control infrastructure, and tools for organizing the data stolen from compromised devices.
Google's Threat Analysis Group (TAG) currently tracks approximately 40 commercial spyware vendors that develop and sell exploits and malware to the government.
In its latest report, Google lists 11 of those vendors, including Candiru, Cy4Gate, DSIRF, Intellexa, Negg, NSO Group, PARS Defense, QuaDream, RCS Lab, Variston and Wintego Systems.
The company attributes more than 60 unique Android, Chrome, iOS/macOS, WhatsApp and Firefox zero-day vulnerabilities discovered since 2016. The list does not include known (NDAY) security vulnerabilities that spyware vendors have been observed to exploit.
Of the 25 exploited vulnerabilities discovered by TAG in 2023, 20 were exploited by spyware vendors. Additionally, 35 of the 72 zero-day vulnerabilities exploited in Google products since mid-2014 were exploited by these companies.
The security report states that these are only the vulnerabilities that have been discovered. The actual number of exploited vulnerabilities may be higher because there are still vulnerabilities that have not yet been detected or have not yet been linked to spyware vendors.
Financial perspective
Spyware vendors are willing to pay millions of dollars for access to vulnerabilities that enable complete control of devices. They are also able to generate high revenues from individual customers, offering services that include delivery mechanisms, exploits, command-and-control infrastructure, and tools to steal data.
Report Tracking Vendors
Google's Threat Analysis Group (TAG) is tracking about 40 vendors that develop and sell spying tools for government customers.
Google mentions several spyware vendors in its report, including Candiru, Cy4Gate, DSIRF, Intellexa, Negg, NSO Group, PARS Defense, QuaDream, RCS Lab, Variston and Wintego Systems.
Attribution of vulnerabilities
More than 60 unique zero-day vulnerabilities discovered since 2016 have been identified as being related to the above vendors.
2023 Review
In 2023, 20 of the 25 zero-day vulnerabilities discovered by TAG are believed to be exploited by spyware vendors. Since mid-2014, 35 of the 72 zero-day vulnerabilities targeting Google products have involved these companies.
typical case
For example, the iOS zero-day vulnerabilities CVE-2023-28205 and CVE-2023-28206, for which Apple hastily released patches in April 2023, and CVE-2023-32409, for which a patch was released in May, have been exploited by Spanish company Variston. Exploitation of Android vulnerability CVE-2023-33063 is now also linked to the same spyware vendor.
Apple recently warned that two iOS vulnerabilities, CVE-2023-42916 and CVE-2023-42917, have been exploited by Turkish company PARS Defense.
Chrome vulnerabilities CVE-2023-2033 and CVE-2023-2136, which were fixed by Google in April, and CVE-2023-3079, which was resolved in June, are attributed to Intellexa.
CVE-2023-7024 is the eighth zero-day vulnerability in Chrome to be fixed in 2023 and is now attributed to the NSO Group.
Google warned in September when it fixed CVE-2023-5217 that the Chrome vulnerability had been exploited by a spyware vendor, but did not name the company. The new report suggests that the spyware vendor is Israel-based Candiru.
CVE-2023-4211, CVE-2023-33106, and CVE-2023-33107 Android vulnerabilities are believed to be the work of Italian company Cy4Gate.
security patch
When Google and Apple patch zero-day vulnerabilities, they inform customers in their bulletins that they are being exploited, but do not provide any information about the attack or the attacker. Google's latest report links several of these zero-day vulnerabilities to specific spyware vendors for the first time.
Original article by Chief Security Officer, if reproduced, please credit https://cncso.com/en/spyware-vendors-linked-to-zero-day-exploits-html