Google‘s Threat Analysis Group (TAG) and Mandiant observed a sharp rise in zero-day vulnerabilities exploited in 2023, with 97 incidents reported, marking a 50% increase from the previous year. Spyware vendors were implicated in a significant portion of these attacks, particularly targeting Google products and the Android ecosystem.
While financially motivated actors utilized ten zero-day vulnerabilities, Chinese cyber espionage groups led the charge with 12 exploits, demonstrating a concerning trend of government-backed attacks. Notably, commercial surveillance vendors (CSVs) were responsible for half of all zero-day exploits in 2023, emphasizing the critical role of spyware in contemporary cyber threats.
Google recommends robust security measures, such as enabling Memory Tagging Extension (MTE) and Lockdown mode for Pixel 8 and iPhone smartphones, respectively, to mitigate the risks associated with zero-day exploits. Additionally, high-risk users are encouraged to enroll in Google’s Advanced Protection Program (APP) for enhanced security against state-backed attackers.