A publication by Google comes to remind us that in Greece surveillances are good. THE company he says:
“To protect our users, the Threat Analysis Team (TAG from Threat Analysis group) της Google αναζητά συστηματικά ευπάθειες 0day που εκμεταλλεύονται στο διαδίκτυο. Το 2021, αναφέραμε εννέα 0day που επηρεάζουν το Chrome, το Android, την Apple και τη Microsoft, οδηγώντας σε ενημερώσεις κώδικα για την προστασία των χρηστών από αυτές τις επιθέσεις.
This post is a follow-up to our July 2021 post on four 0day vulnerabilities we discovered in 2021 and details the campaigns that target users Android with five distinct vulnerabilities:
- CVE-2021-37973, CVE-2021-37976, CVE-2021-38000, CVE-2021-38003 in Chrome
- CVE-2021-1048 on Android
We assess with high confidence that these exploits were packaged by a single commercial surveillance company, Cytrox, and sold to different government-backed actors who used them in at least three campaigns listed below. Based on CitizenLab's findings, we estimate that the government-backed entities that purchased these exploits are likely operating in (at least) Egypt, Armenia, Greece, Madagascar, Ivory Coast, Serbia, Spain, and Indonesia.
Our findings highlight the extent to which vendors of commercial malware software surveillance have multiplied the capabilities used by governments.
Seven of the nine 0day TAGs discovered in 2021 fall into this category: they were developed by commercial providers, sold and used by government-backed entities.
TAG closely monitors more than 30 suppliers with different levels of complexity and public reports that sell exploits or surveillance capabilities to government-sponsored entities.