Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Google, Mandiant Share Data on Record Pace of Zero-Day Discoveries

Google and Mandiant separately called attention to a dramatic surge in the discovery of in-the-wild zero-day attacks and warned that nation-state APT actors, ransomware gangs and private mercenary exploit firms are burning through zero-days at record pace.

Google and Mandiant separately called attention to a dramatic surge in the discovery of in-the-wild zero-day attacks and warned that nation-state APT actors, ransomware gangs and private mercenary exploit firms are burning through zero-days at record pace.

According to data from Google’s Project Zero outfit, there were 58 in-the-wild zero-day discoveries last year, the most ever recorded since the company started tracking the problem.

A separate report from Mandiant said its threat intelligence team monitored a whopping 80 zero-days exploited in 2021, more than double the previous record seen in 2019. 

“As an industry we’re not making 0-day hard,” Project Zero’s Maddie Stone said in a note documenting the attacks seen in 2021. “Attackers are having success using vulnerabilities similar to what we’ve seen previously and in components that have previously been discussed as attack surfaces,” Stone added. 

[ READ: Secretive Israeli Exploit Company Behind Wave of Zero-Days ]

Stone, who tracks some zero-day activity on a public spreadsheet, said the noticeable increase shows that defenders are getting better at detecting and disclosing in-the-wild attacks but called on all vendors to adopt “industry standard behavior” to go public when there is evidence of exploitation before patches or mitigations are available.

Stone also called on all affected vendors and security researchers to share exploit samples or detailed descriptions of the exploit techniques seen in attacks and for the industry to focus on mitigating memory corruption vulnerabilities.

Out of the 58 in-the-wild zero-days observed by Project Zero in 2021, Stone noted that 39 vulnerabilities (67%) were memory corruption vulnerabilities.

“Memory corruption vulnerabilities have been the standard for attacking software for the last few decades and it’s still how attackers are having success. Out of these memory corruption vulnerabilities, the majority also stuck with very popular and well-known bug classes,” Stone added.

Mandiant researcher James Sadowski said his company’s data shows state-sponsored APT groups as the primary actors exploiting zero-day vulnerabilities but warned of a noticeable surge in financially motivated crime groups using zero-day exploits.

[ READ: Sophisticated APT Group Burned 11 Zero-Days in Mass Spying Operation ]

”The proportion of financially motivated actors — particularly ransomware groups — deploying zero-day exploits also grew significantly, and nearly 1 in 3 identified actors exploiting zero-days in 2021 was financially motivated,” Sadowski said, noting that threat actors exploited zero-days in Microsoft, Apple, and Google products most frequently, likely reflecting the popularity of these vendors. 

Zero Days

Among nation state-backed threat actors, Mandiant said Chinese groups consistently lead the way in the deployment of malware via zero-day exploitation. 

“From 2012 to 2021, China exploited more zero-days than any other nation. However, we observed an increase in the number of nations likely exploiting zero-days, particularly over the last several years, and at least 10 separate countries have likely exploited zero-days since 2012,” according to the Mandiant data.

Mandiant said it also observed private vendors emerging as “significant exploit brokers” in 2021. 

“We identified at least six zero-day vulnerabilities actively exploited in 2021, potentially by customers of malware vendors, including one reportedly exploited in tools developed by two separate vendors. In 2021, at least five zero-day vulnerabilities were reportedly exploited by an Israeli commercial vendor,” the company said.  

Related: Secretive Israeli Exploit Company Behind Wave of Zero-Day Exploits

Related: Microsoft Raises Alarm for New Windows Zero-Day Attacks

Related: Sophisticated APT Group Burned 11 Zero-Days in Mass Spying Operation

Related: Apple Says WebKit Zero-Day Hitting iOS, macOS Devices

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Nation-State

The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.