Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Google Tracked 75 Zero-Days in 2024

The number of exploited zero-days seen by Google in 2024 dropped to 75, from 98 observed in the previous year.

Google’s Threat Intelligence Group on Tuesday published its analysis of zero-day vulnerability exploitation for 2024.

A zero-day is a vulnerability that has been exploited in the wild before a patch was released to the public. This is the definition used by Google and many others in the industry, but some individuals and cybersecurity companies have different definitions, in some cases referring to any new vulnerability — even if it has not been exploited — as a zero-day. 

The internet giant reported tracking 75 zero-day vulnerabilities in 2024, a decrease from the 98 observed in 2023, but still more than the 63 spotted in 2022. 

Of the 75 zero-days seen last year, 33 impacted enterprise technologies such as networking and security products, while the rest affected end-user products such as browsers, operating systems and mobile devices.

In the case of end-user products, Google observed an increase in Windows exploits and a significant drop in Safari and iOS exploits. Chrome remained the most targeted browser, which Google says is an indication of its massive popularity. 

The company also reported that roughly 90% of the exploits chaining multiple vulnerabilities were aimed at mobile devices. In the case of Android, a significant percentage of exploits targeted third-party components.

As for enterprise products, Google pointed to the targeting of Ivanti, Palo Alto Networks, and Cisco appliances, and explained why they can represent a tempting target for threat actors.

“Endpoint detection and response (EDR) tools are not usually equipped to work on these products, limiting available capabilities to monitor them. Additionally, exploit chains are not generally required to exploit these systems, giving extensive power to individual vulnerabilities that can single-handedly achieve remote code execution or privilege escalation,” the company said.

As for who was behind the exploitation of zero-days in 2024, Google was able to find links to known threat actors in the case of 34 of the 75 exploits. Nearly 45% were attributed to state-sponsored threat actors that used them for espionage or financially motivated attacks. 

Advertisement. Scroll to continue reading.

Nearly a quarter of the 34 zero-days were linked to commercial surveillance vendors, and roughly 30% were linked to non-state financially motivated groups.

Additional information and trends are available in Google’s full report (PDF).

Related: Exploited Vulnerability Exposes Over 400 SAP NetWeaver Servers to Attacks

Related: Craft CMS Zero-Day Exploited to Compromise Hundreds of Websites

Related: South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Cloud and cybersecurity MSP Ekco has appointed Ben Savage as UK CEO.

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.