MSN
  • Accueil
  • About Us
  • Our Actions
  • Our Core Team
  • Our Partners
  • News
MSN
  • Home
  • About
  • Our Actions
  • Team
  • Partners
  • NEWS

Google reveals sophisticated Windows and Android hacking operation

Page d'accueil Innovation Google reveals sophisticated Windows and Android hacking operation
Innovation

Google reveals sophisticated Windows and Android hacking operation

janvier 12, 2021
By msnadmin
0 Comment
17 Views


google-android-windows-hacking-campaign.png

Image: Google Project Zero

Google published a six-part report today detailing a sophisticated hacking operation that the company detected in early 2020 and which targeted owners of both Android and Windows devices.

The attacks were carried out via two exploit servers delivering different exploit chains via watering hole attacks, Google said.

Also: Best VPNs

« One server targeted Windows users, the other targeted Android, » Project Zero, one of Google’s security teams, said in the first of six blog posts.

Google said that both exploit servers used Google Chrome vulnerabilities to gain an initial foothold on victim devices. Once an initial entry point was established in the user’s browsers, attackers deployed an OS-level exploit to gain more control of the victim’s devices.

The exploit chains included a combination of both zero-day and n-day vulnerabilities, where zero-day refers to bugs unknown to the software makers, and n-day refers to bugs that have been patched but are still being exploited in the wild.

All in all, Google said the exploit servers contained:

  • Four « renderer » bugs in Google Chrome, one of which was still a 0-day at the time of its discovery.
  • Two sandbox escape exploits abusing three 0-day vulnerabilities in the Windows OS.
  • And a « privilege escalation kit » composed of publicly known n-day exploits for older versions of the Android OS.

The four zero-days, all of which were patched in the spring of 2020, were as follows:

Google said that while they did not find any evidence of Android zero-day exploits hosted on the exploit servers, its security researchers believe that the threat actor most likely had access to Android zero-days as well, but most likely weren’t hosting them on the servers when its researchers discovered it.

Google: Exploit chains were complex and well-engineered

Overall, Google described the exploit chains as « designed for efficiency & flexibility through their modularity. »

« They are well-engineered, complex code with a variety of novel exploitation methods, mature logging, sophisticated and calculated post-exploitation techniques, and high volumes of anti-analysis and targeting checks, » Google said.

« We believe that teams of experts have designed and developed these exploit chains, » but Google stopped short of providing any other details about the attackers or the type of victims they targeted.

(I mean, TBH you can probably make a pretty intelligent guess about who would do that. You can probably count the number of actors in the world who would go to the trouble of using all those aspects of professionalism on one hand. With fingers left over.)

— Brian in Pittsburgh (@arekfurt) January 12, 2021

Together with its introductory blog post, Google has also published reports detailing a Chrome « infinity bug » used in the attacks, the Chrome exploit chains, the Android exploit chains, post-exploitation steps on Android devices, and the Windows exploit chains.

The provided details should allow other security vendors to identify attacks on their customers and track down victims and other similar attacks carried out by the same threat actor.

Article title updated shortly after publication, changing the term « massive » to « sophisticated » as there is no information on the scale of this operation to support the initial wording.





Source link


Previous Story
How to fix common iOS 14.3 bugs and problems
Next Story
CES 2021: Razer shows off ‘smart’ prototype mask with so-called sterilisation charging case

Related Articles

SpaceX launches off more Starlink satellites as part of its first ride-sharing space service

[ad_1] Elon Musk's SpaceX on Sunday launched a Falcon 9...

Fedora preemptively turns off Chromium usage of private Google Sync APIs

[ad_1] Fedora has jumped seven weeks before Google ends the...

Leave your comment Cancel Reply

(will not be shared)

Recent Post

  • SpaceX launches off more Starlink satellites as part of its first ride-sharing space service lundi, 25, Jan
  • Fedora preemptively turns off Chromium usage of private Google Sync APIs lundi, 25, Jan
  • Jio passes $3 billion in third quarter revenue lundi, 25, Jan
  • 14 courses to help you start a side hustle as a web developer for $35 dimanche, 24, Jan
  • She went for an in-person job interview. Suddenly, she wished it had been on Zoom dimanche, 24, Jan
Copyright ©2020 Maghreb Start-up Network. All Rights Reserved
SearchPostsLogin
lundi, 25, Jan
SpaceX launches off more Starlink satellites as part of its first ride-sharing space service
lundi, 25, Jan
Fedora preemptively turns off Chromium usage of private Google Sync APIs
lundi, 25, Jan
Jio passes $3 billion in third quarter revenue
dimanche, 24, Jan
14 courses to help you start a side hustle as a web developer for $35
dimanche, 24, Jan
She went for an in-person job interview. Suddenly, she wished it had been on Zoom
dimanche, 24, Jan
iPhone tip: This app tests almost every component in your iPhone

Welcome back,