Google Claims that Spyware Vendors are Leading Zero-Day Exploitation Efforts

Morgan Phisher May 15, 2024

Hey Bay Area folks! We’ve got some interesting insights to share with you from the cybersecurity desk. You know how we always tell you to be careful with what you download or click on the internet? Well, it turns out that commercial surveillance vendors (or CSVs for short) are among the major culprits behind the rise of spyware in our digital space. Not great news, right? But here’s the low-down.

Just recently, Google’s Threat Analysis Group (TAG) let out a report about how CSVs are exploiting system vulnerabilities. This is happening because CSVs have gotten savvy at developing exploit chains. These devious little things work by taking advantage of the tiniest chinks, in both zero-day and known vulnerabilities. Just think of it as a Trojan Horse of the digital world! Oh, and before we move on, zero-day vulnerabilities refer to holes in software that are unknown to those who should be interested in mitigating the threat – namely, the party that created the software.

TAG’s new report throws a spotlight on some pretty alarming data. For instance, Google is laying the blame for half the known zero-day exploits used against its products at CSVs’ doorsteps. CSVs are also offering some sly “pay-to-play tools” that pack surveillance software with exploit chains, specifically designed to dodge security measures on targeted gadgets. Unfortunately, these sneaky moves are becoming more common, leading to ready-made “espionage solutions”.

Now, if you’re wondering why we should care, it’s because journalists, human rights activists and even regular folks who oppose government actions (who TAG calls “high-risk users”) have been harmed by spyware. The threat seems to have escalated to the point that Google believes that it’s not enough just to warn people anymore. They’re pushing for collective action by the government, industry and regular folks like us to battle spyware and the shady companies behind it.

Mainstream surveillance tools aren’t just affecting targeted individuals – they’re damaging wider society. Despite the effective steps taken by various global government initiatives in the past couple of years, TAG urges more efforts for sustained action. As Bay Area dwellers, we understand the importance of continuous innovation and disruption, right?

In this fast-paced industry, CSVs are quick on their feet. When they encounter any sort of negative attention, they often change their names and pop up somewhere else. Google estimates over 40 CSVs that develop and sell exploits around the globe, but the actual number is anyone’s guess.

But here’s the good news – our folks from Google are fighting back. As expected, developing these exploit chains isn’t a cakewalk for CSVs; they’re expensive and hard to create. So, each time Google and other security buffs discover and disclose new bugs, CSVs stumble, giving us the upper hand we need.

While CSVs seem to have a short-term advantage, they’re not invincible. Steps taken by tech vendors have stopped some exploits. However, these CSVs are resourceful and can adapt to such defenses, often developing new exploits. It’s one tough battle, isn’t it?

In the meantime, Google’s TAG emphasizes the importance of comprehensive government regulation and policies. Let’s keep our fingers crossed! Sanctions may not entirely shut CSVs down, but they do restrict their activities. At the end of the day, transparency, both from the government and from surveillance vendors, is crucial to ensure our digital world becomes a safer place. So let’s keep fighting the good fight, Bay Area!

by Morgan Phisher | HEAL Security