Technology giant, Google, has rolled out Chrome version 86.0.4240.111 that brings about a patch for an actively exploited zero-day vulnerability. Per our KNOW platform, the zero-day attack could be described as “a memory corruption bug in the FreeType font rendering library that’s included with standard Chrome distributions”. Project Zero is one of Google’s internal security teams. KNOW discovered that these attacks were leveraging the FreeType bug. Project Zero team lead Ben Hawkes pointed out a threat actor that was abusing this FreeType bug to mount attacks against Google Chrome users.
Project Zero discovered and reported an actively exploited 0day in freetype that was being used to target Chrome. A stable release that fixes this issue (CVE-2020-15999) is available here: https://t.co/ZRQe72Qfkh
— Ben Hawkes (@benhawkes) October 20, 2020
Zero-Day Vulnerability in FreeType was discovered and reported by our KNOW platform. Netenrich’s KNOW is not just a threat intel dashboard, but it also happens to be a news aggregator serving up the latest and hottest stories in the cybersecurity space. Since today’s topic of the day is “vulnerabilities,” let’s see how we can leverage KNOW’s feed to educated ourselves about the most trending vulnerabilities in the global threat landscape.Sounds interesting? Get to KNOW
Investigating Zero-Day Attack with KNOW
In this particular story, KNOW has detected two Zero-Day Attack vulnerabilities which could provide more context into the problem discussed above:
Now, let’s look into each of them and see what we can learn.
Zero Day Attack Vulnerability 1: CVE-2019-13720
Risk rules triggered: 4 out of 48 rule(s) triggered
Historically Linked To Campaign: 1 sighting(s)
1 Related Campaign: Operation WizardOpium.
Historically Linked To Threat Research: 5 sighting(s)
4 Related Intrusion Methods: Zero Day, Use-After-free, Watering Hole Attack, Privilege Escalation.
Historic Sandbox Sighting: 2 sighting(s)
Most recent reference: Hybrid Analysis result for ‘file’
See how Netenrich detects and resolves CVE-2019-13720
Zero Day Attack Vulnerability 2: CVE-2020-6418
Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Products Affected: Google, Chrome, 80.0.3987.122
KNOW more about CVE-2020-6418 and other pernicious beings
Netenrich Threat + Attack Surface Intelligence
KNOW is Netenrich’s Threat Intel Platform that extracts data from billions of data points and correlates relevant intel and expert analyst insights to help you follow, search, and act—in a fraction of the time it takes now. However, Netenrich’s offering isn’t just limited to threat intelligence. We offer a powerful combination of threat and attack surface intelligence.
Threat and Attack Surface Intelligence will help your SecOps to:
- Find hidden risks to your brand on the public Internet
- Stay informed about threats in minutes versus hours
- Act on the most critical threats first
- Reduce effort and alert fatigue
- Measure and demonstrate value
If you want to know more about Netenrich’s Attack Surface Intelligence (ASI), click here.
Hey, before you leave, you might want to read our CISO, Brandon Hoffman’s take on the rise of cyber crimes during U.S. Elections 2020 — as part of our National Cyber Security Awareness Month series. Sure, take me there