Google: 75 zero-days seen in 2024 as nations, spyware vendors continue exploitation

Google: 75 zero-days seen in 2024 as nations, spyware vendors continue exploitation

The number of unreported bugs exploited by criminals, nation states and commercial vendors fell in 2024, but hackers are increasingly targeting vulnerabilities in security software and appliances to gain greater access to victim systems.

Google’s Threat Intelligence team published its annual zero-day report on Tuesday, finding that 75 vulnerabilities were exploited in the wild in 2024, down from 98 in the prior year. Google defines zero-days as vulnerabilities exploited in the wild before a patch is made publicly available. Cyber espionage remains the leading motivation behind the exploitation of bugs.

The report categorises the 75 bugs into two groups: those affecting end-user platforms like mobile devices or browsers, and those impacting security software and appliances.

Key Points

  • 75 vulnerabilities exploited in 2024, down from 98 in 2023.
  • Focus shifted towards security software and appliances rather than just browsers and mobile devices.
  • Chinese, Russian, and North Korean hackers lead in zero-day exploitation, with substantial contributions from commercial surveillance vendors.
  • Enterprise software and appliances saw an increase in targeted zero-day bugs, despite an overall decrease.
  • A significant rise (30%) in zero-day exploits attributed to Chinese actors, particularly targeting Ivanti products.

Why should I read this?

If you care about cybersecurity trends, this article is a must-read! Understanding the shift in hacker tactics and the types of vulnerabilities being targeted can help you better protect your systems. Plus, knowing who’s behind these exploits — like state-sponsored actors and commercial spying outfits — gives you insight into the threats out there. We’ve sorted through the details for you, so make sure to stay ahead of the game!

Source: The Record