By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: Google experts exposed sophisticated hacking campaign against Windows and Android users
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > Google experts exposed sophisticated hacking campaign against Windows and Android users
google
News

Google experts exposed sophisticated hacking campaign against Windows and Android users

Last updated: 2022/08/05 at 11:54 PM
Security Parrot Editorial Team Published January 15, 2021
Share
google
SHARE

Google published a large report detailing a complex hacking operation discovered back in early 2020. The campaign targeted Android and Windows users, and attackers exploited four zero-day vulnerabilities to attack.

The researchers say the attacks they discovered came from two exploit servers (one for Android, the other for Windows) and used a watering hole technique. Such attacks are named by analogy with the tactics of predators that hunt at a watering hole, waiting for prey – animals that have come to drink. This term refers to attacks in which cybercriminals inject malicious code onto legitimate sites that redirects visitors to where the hackers want them.

Both servers exploited vulnerabilities in Google Chrome to gain a foothold on victims’ devices. The attackers then deployed the exploit at the OS level in order to gain more control over the infected device.

General attack pattern

The attacker’s exploit chains were combinations of zero-day vulnerabilities, as well as other recent issues that were already fixed by the developers. So, four errors in Google Chrome were related to the renderer, and one of them at the time of detection was 0-day. In Windows, hackers exploited two zero-day vulnerabilities that allowed them to escape the sandbox. In addition, the attackers had a “privilege escalation suite” of well-known exploits for known vulnerabilities in Android. At the same time, experts note that the hackers, most likely, used 0-day vulnerabilities in Android too, they simply did not store exploits for them on the discovered server.

The four above mentioned 0-day bugs are:

  • CVE-2020-6418 – Chrome TurboFan Vulnerability (fixed in February 2020)
  • CVE-2020-0938 – Windows font vulnerability (fixed in April 2020);
  • CVE-2020-1020 – Windows font vulnerability (fixed in April 2020);
  • CVE-2020-1027 – Windows CSRSS vulnerability (fixed in April 2020).

Attackers’ exploit chains are described by experts as tools “designed to be more efficient and flexible through their modularity”.

“This is well-designed, complex code with many new exploitation methods, serious logging, sophisticated and calculated post-exploitation methods, and a lot of anti-analytic and targeted checks. We believe that these exploit chains were designed and developed by teams of experts, ”the report says.

Unfortunately, Google has not yet released any details about the attackers themselves, or about the victims they targeted.

Weekly Updates For Our Loyal Readers!

Security Parrot Editorial Team January 15, 2021
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?