Live
- Odisha BJP chief to be elected in January
- AP Home Minister Anitha alerts officials amid rains in heavy Rains in Tirupati
- Taluk Guarantee panel
- Uber Launches Uber Moto Women for Safer and Flexible Rides in Bengaluru
- ‘Fear’ pre-release event creates waves
- Champions Trophy 2025 Host Change? Indian Broadcaster's Promo Sparks Controversy
- Nabha Natesh introduced as Sundara Valli from ‘Swayambhu’
- Aamir Khan praises Upendra's ‘UI: The Movie’ ahead of its release
- Celebrations: Keerthy Suresh ties the knot with Antony Thattil
- Indian scientists develop flexible near-infrared devices for wearable sensors
Just In
Google discovers new commercial spyware that exploits Chrome, Firefox
As commercial spyware like Pegasus puts advanced surveillance capabilities in the hands of governments to spy on journalists, human rights activists, political opposition and dissidents, Google has discovered a new commercial spyware that exploits vulnerabilities in Google Chrome, Mozilla Firefox and Microsoft Defender.
New Delhi: As commercial spyware like Pegasus puts advanced surveillance capabilities in the hands of governments to spy on journalists, human rights activists, political opposition and dissidents, Google has discovered a new commercial spyware that exploits vulnerabilities in Google Chrome, Mozilla Firefox and Microsoft Defender.
The Google Threat Analysis Group (TAG) shared findings on an exploitation framework with likely ties to Variston IT, a company in Barcelona, Spain that claims to be a provider of custom security solutions.
"Their Heliconia framework exploits n-day vulnerabilities in Chrome, Firefox and Microsoft Defender and provides all the tools necessary to deploy a payload to a target device," said the team.
Google, Microsoft and Mozilla fixed the affected vulnerabilities in 2021 and early 2022.
"While we have not detected active exploitation, it appears likely these were utilised as zero-days in the wild," said the TAG researchers.
TAG has created detections in Safe Browsing to warn users when they attempt to navigate to dangerous sites or download dangerous files.
"To ensure full protection against Heliconia and other exploits, it's essential to keep Chrome and other software fully up-to-date," they mentioned in a blog post.
The TAG security team became aware of the Heliconia framework when Google received an anonymous submission to the Chrome bug reporting programme.
"The exploitation frameworks, listed below, included mature source code capable of deploying exploits for Chrome, Windows Defender and Firefox. Although the vulnerabilities are now patched, we assess it is likely the exploits were used as 0-days before they were fixed," said the Google researchers.
Earlier reports have shown proliferation of commercial surveillance and the extent to which commercial spyware vendors have developed capabilities that were previously only available to governments with deep pockets and technical expertise.
TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors.
The Google teams earlier this year found strong evidence that enterprise-grade Android spyware called 'Hermit' is being used via SMS messages to target high-profile Android users.
'Hermit' is likely developed by Italian spyware vendor RCS Lab and Tykelab Srl, a telecommunications solutions company operating as a front company.
Italian spyware vendor RCS Lab, a known developer that has been active for over three decades, operates in the same market as Pegasus developer NSO Group.
RCS Lab has engaged with military and intelligence agencies in Pakistan, Chile, Mongolia, Bangladesh, Vietnam, Myanmar and Turkmenistan.
© 2024 Hyderabad Media House Limited/The Hans India. All rights reserved. Powered by hocalwire.com