³Ô¹ÏÍøÕ¾

Google and Mandiant reveal rise in Zero-Day vulnerabilities exploited in 2023

Mandiant

Google’s Threat Analysis Group (TAG) and Mandiant, renowned leaders in cybersecurity research, have released their annual report on zero-day vulnerabilities, highlighting a significant surge in exploitation incidents witnessed in 2023. The report, available here, unveils crucial insights into the evolving landscape of cyber threats and underscores the urgent need for enhanced vigilance and collaborative efforts across the industry.

According to the findings, 97 zero-day vulnerabilities were observed exploited in-the-wild throughout 2023, marking a notable escalation from the previous year’s figure of 62 vulnerabilities. While this increase is substantial, it falls short of the record high of 106 vulnerabilities recorded in 2021, providing a nuanced perspective on the evolving threat landscape.

Key contributors to the discovery of these vulnerabilities include Google’s TAG and Mandiant, who collectively identified 29 of the exploited zero-day vulnerabilities. Their relentless dedication to uncovering emerging threats has been instrumental in fortifying cyber defences worldwide.

The vulnerabilities were categorised into two primary domains: end-user platforms and products, encompassing mobile devices, operating systems, browsers, and other applications, and enterprise-focused technologies, including security software and appliances. Notably, the report emphasises that despite notable strides in addressing vulnerabilities, the pace of zero-day discovery and exploitation remains elevated compared to pre-2021 levels.

Further analysis reveals compelling insights into threat actor motivations, with espionage actors accounting for the majority of exploits. Of the 58 zero-days attributed to threat actors’ motivations, 48 were linked to espionage activities, while financially motivated actors accounted for the remaining 10.

The report sheds light on the prominent role of the People’s Republic of China (PRC) in government-backed exploitation, with PRC cyber espionage groups exploiting 12 zero-day vulnerabilities in 2023, a significant increase from seven incidents in 2022.

End-user platforms and products bore the brunt of zero-day exploits, with 61 vulnerabilities affecting these systems, underscoring the critical need for fortified defences in consumer-facing technologies. Conversely, enterprise-focused technologies witnessed a surge in targeting, with a 64 percent increase observed in adversary exploitation compared to the previous year.

A notable shift was observed in the nature of vulnerabilities, with a higher prevalence of bugs detected in third-party components and libraries as opposed to first-party code. Additionally, the report highlights disparities between operating systems, with Android and iOS witnessing increased targeting, and web browsers such as Chrome and Safari facing a substantial number of zero-day exploits.

While acknowledging the progress made by end-user platform vendors such as Apple, Google, and Microsoft in mitigating vulnerabilities, the report underscores the necessity for sustained collaborative efforts to confront emerging cyber threats effectively.

/Public Release.