The Google Project Zero team has recently launched an initiative aimed at devising new techniques to detect 0-day exploits employed in attacks in the wild. While partnering with the Google Threat Analysis Group (TAG), the experts discovered a watering hole attack in Q1 2020 that was carried out by a highly sophisticated actor.
The campaign spotted by Project Zero experts targeted Windows and Android systems. Threat actors behind the attacks exploited multiple vulnerabilities in Android, Windows, and chained them with Chrome flaws. The attackers exploited both zero-days and n-days exploits.
“We discovered two exploit servers delivering different exploit chains via watering hole attacks. One server targeted Windows users, the other targeted Android. Both the Windows and the Android servers used Chrome exploits for the initial remote code execution.” reads the analysis published by Project Zero. “The exploits for Chrome and Windows included 0-days. For Android, the exploit chains used publicly known n-day exploits. Based on the actor’s sophistication, we think it’s likely that they had access to Android 0-days, but we didn’t discover any in our analysis.”
The attacks employed two exploit servers that were triggering multiple vulnerabilities through different exploit chains in watering hole attacks,
The two servers were hosting exploits to trigger Google Chrome vulnerabilities to gain an initial foothold on the visitors’ devices. The attackers exploited Windows and Android exploit to take over the victim’s devices.
The experts were able to extract the following code from the exploit servers:
The chains used by the attackers included the following 0-days flaws:
The Project Zero team spent many months analyzing in detail each part of the attack chain employed in this campaign, they detailed their findings in 6 separate reports:
Google highlighted the level of sophistication of this campaign, the threat actors appears to be well resourced and the overall operations well-engineered.
“They are well-engineered, complex code with a variety of novel exploitation methods, mature logging, sophisticated and calculated post-exploitation techniques, and high volumes of anti-analysis and targeting checks,” Google concludes.
“We believe that teams of experts have designed and developed these exploit chains,”
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
|[adrotate banner=”9″]||[adrotate banner=”12″]|
(SecurityAffairs – hacking, Project Zero)