{"id":165094,"date":"2025-04-29T10:00:00","date_gmt":"2025-04-29T10:00:00","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2025\/04\/29\/government-hackers-are-leading-the-use-of-attributed-zero-days-google-says-techcrunch\/"},"modified":"2025-04-29T10:00:00","modified_gmt":"2025-04-29T10:00:00","slug":"government-hackers-are-leading-the-use-of-attributed-zero-days-google-says-techcrunch","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2025\/04\/29\/government-hackers-are-leading-the-use-of-attributed-zero-days-google-says-techcrunch\/","title":{"rendered":"Government hackers are leading the use of attributed zero-days, Google says | TechCrunch"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Hackers working for governments were responsible for the majority of attributed zero-day exploits used in real-world cyberattacks last year, per <a rel=\"nofollow noopener\" href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/2024-zero-day-trends\" target=\"_blank\">new research from Google<\/a>.<\/p>\n<p class=\"wp-block-paragraph\">Google\u2019s report said that the number of <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#zero-day\" target=\"_blank\" rel=\"noreferrer noopener\">zero-day<\/a> exploits \u2014 referring to security flaws that were unknown to the software makers at the time hackers abused them \u2014 had dropped from 98 exploits in 2023 to 75 exploits in 2024. But the report noted that of the proportion of zero-days that Google could attribute \u2014 meaning identifying the hackers who were responsible for exploiting them \u2014 at least 23 zero-day exploits were linked to government-backed hackers.<\/p>\n<p class=\"wp-block-paragraph\">Among those 23 exploits, 10 zero-days were attributed to hackers working directly for governments, including five exploits linked to China and another five to North Korea.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Another eight exploits were identified as having been developed by <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#spyware-commercial-government\" target=\"_blank\" rel=\"noopener\">spyware makers<\/a> and surveillance enablers, such as NSO Group, which typically claim to only sell to governments. Among those eight exploits made by spyware companies, Google is also counting <a href=\"https:\/\/techcrunch.com\/2024\/12\/15\/serbian-police-used-cellebrite-to-unlock-then-plant-spyware-on-a-journalists-phone\/\" target=\"_blank\" rel=\"noopener\">bugs<\/a> that were <a href=\"https:\/\/techcrunch.com\/2025\/02\/26\/cellebrite-suspends-serbia-as-customer-after-claims-police-used-firms-tech-to-plant-spyware\/\" target=\"_blank\" rel=\"noopener\">recently exploited<\/a> by Serbian authorities using Cellebrite phone-unlocking devices.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><figcaption class=\"wp-element-caption\"><span class=\"wp-element-caption__text\">A chart showing the zero-day exploits that were attributed in 2024. (Image: Google)<\/span><\/figcaption><\/figure>\n<p class=\"wp-block-paragraph\">Despite the fact that there were eight recorded cases of zero-days developed by spyware makers, Cl\u00e9ment Lecigne, a security engineer at Google\u2019s Threat Intelligence Group (GTIG), told TechCrunch that those companies \u201care investing more resources in operational security to prevent their capabilities being exposed and to not end up in the news.\u201d\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Google added that surveillance vendors continue to proliferate.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cIn instances where law enforcement action or public disclosure has pushed vendors out of business, we\u2019ve seen new vendors arise to provide similar services,\u201d James Sadowski, a principal analyst at GTIG, told TechCrunch. \u201cAs long as government customers continue to request and pay for these services, the industry will continue to grow.\u201d\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The remaining 11 attributed zero-days were likely exploited by cybercriminals, such as ransomware operators <a href=\"https:\/\/techcrunch.com\/2025\/01\/31\/a-brief-history-of-mass-hacks\/\" target=\"_blank\" rel=\"noopener\">targeting enterprise devices<\/a>, including VPNs and routers.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The report also found that the majority of the total 75 zero-days exploited during 2024 were targeting consumer platforms and products, like phones and browsers; while the rest exploited devices typically found on corporate networks.<\/p>\n<p class=\"wp-block-paragraph\">The good news, according to Google\u2019s report, is that software makers defending against zero-day attacks are increasingly making it more difficult for exploit makers to find bugs.<\/p>\n<p class=\"wp-block-paragraph\">\u201cWe are seeing notable decreases in zero-day exploitation of some historically popular targets such as browsers and mobile operating systems,\u201d per the report.<\/p>\n<p class=\"wp-block-paragraph\">Sadowski specifically pointed to <a href=\"https:\/\/techcrunch.com\/2022\/07\/06\/apple-lockdown-mode\/\" target=\"_blank\" rel=\"noopener\">Lockdown Mode<\/a>, a special feature for iOS and macOS that disables certain functionality with the goal of hardening cellphones and computers, which has a proven <a href=\"https:\/\/techcrunch.com\/2023\/04\/18\/apple-lockdown-mode-iphone-nso-pegasus\/\" target=\"_blank\" rel=\"noopener\">track<\/a> <a href=\"https:\/\/techcrunch.com\/2023\/12\/07\/apple-says-it-is-not-aware-anyone-using-lockdown-mode-got-hacked\/\" target=\"_blank\" rel=\"noopener\">record<\/a> of stopping government hackers; as well as <a rel=\"nofollow noopener\" href=\"https:\/\/developer.arm.com\/documentation\/108035\/latest\/Introduction-to-the-Memory-Tagging-Extension\" target=\"_blank\">Memory Tagging Extension<\/a> (MTE), a security feature of modern Google Pixel chipsets that helps detect certain types of bugs and improve device security.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Reports like Google\u2019s are valuable because they give the industry, and observers, data points that contribute to our understanding of how government hackers operate \u2014 even if an inherent challenge with counting zero-days is that, by nature, some of them go undetected, and of those that are detected, some still go without attribution.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2025\/04\/29\/government-hackers-are-leading-the-use-of-attributed-zero-days-google-says\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers working for governments were responsible for the majority of attributed zero-day exploits used in real-world cyberattacks last year, per new research from Google. Google\u2019s report said that the number of zero-day exploits \u2014 referring to security flaws that were unknown to the software makers at the time hackers abused them \u2014 had dropped from [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":165095,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-165094","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/165094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=165094"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/165094\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/165095"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=165094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=165094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=165094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}