home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,347 of 2,445   
   Mike Powell to All   
   75 zero-day exploitations   
   30 Apr 25 09:16:00   
   
   TZUTC: -0500   
   MSGID: 1080.consprcy@1:2320/105 2c776df2   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   75 zero-day exploitations spotted by Google, governments increasingly   
   responsible for attacks   
      
   Date:   
   Wed, 30 Apr 2025 12:00:00 +0000   
      
   Description:   
   Of all the zero-days abused in 2024, the majority were used in    
   state-sponsored attacks by China and North Korea.   
      
   FULL STORY   
      
   In 2024, Googles Threat Intelligence Group (GTIG) discovered 75 zero-day   
   vulnerabilities, and argued that the majority were used in state-sponsored   
   hacking campaigns. The company made these claims in Hello zero-day my old   
   friend, a 2024 exploitation analysis paper published recently.    
      
   In the report, Google says that the number of zero-day flaws dropped compared   
   to 2023 (from 98 to 75). However, the four-year trend is that the rate of   
   zero-day exploitation continues to grow at a slow but steady pace.    
      
   While consumer devices continue to be the most attacked targets, there is an   
   increase in adversaries exploiting enterprise-specific technologies. In 2023,   
   roughly a third (37%) of zero-days targeted enterprise products, jumping to   
   44% last year. This, Google says, is primarily fueled by the increased   
   exploitation of security and networking software and appliances.   
      
   Governments at it again   
      
   In fact, zero-day vulnerabilities in security software and appliances were a   
   high-value target in 2024. Google says it identified 20 security and   
   networking flaws, which was over 60% of all zero-day exploitation of   
   enterprise technologies. Since the exploitation of these products results in    
   a more efficient and extensive system and network compromise, Google expects   
   threat actors focus on these technologies to continue growing.    
      
   The biggest abusers of zero-day vulnerabilities are the governments, Google   
   says. Between government-backed groups and customers of commercial   
   surveillance vendors, actors conducting cyber espionage operations accounted   
   for over 50% of the vulnerabilities we could attribute in 2024, the report   
   says.    
      
   Google singled out China as a major player in this regard, but also mentioned   
   North Korea, whose operatives mixed espionage with financially motivated   
   operations.    
      
   The number of Windows exploits rose to 22 (from 16 the year before), while on   
   Safari and iOS it fell (from 11 and 9 to 3 and 2). Android retained its lucky   
   number 7, as did Chrome. Firefox was up from zero in 2023 to one in 2024.    
      
    Via Ars Technica   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/75-zero-day-exploitations-spotted-by-go   
   ogle-governments-increasingly-responsible-for-attacks   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca