Subscribe To Our Newsletter!

Stay up to date on the top trending threats as well as the top stories in Security, Networks, Cloud, IT Ops & AIOps.

Zero Day Attack Revealed In KNOW – Google Chrome Updates

KNOW discovered that these attacks were leveraging the FreeType bug.

Post by Tanuj Mitra In Security on Oct 23, 2020

Technology giant, Google, has rolled out Chrome version 86.0.4240.111 that brings about a patch for an actively exploited zero-day vulnerability. Per our KNOW platform, the zero-day attack could be described as “a memory corruption bug in the FreeType font rendering library that’s included with standard Chrome distributions”. Project Zero is one of Google’s internal security teams. KNOW discovered that these attacks were leveraging the FreeType bug. Project Zero team lead Ben Hawkes pointed out a threat actor that was abusing this FreeType bug to mount attacks against Google Chrome users.

Zero-Day Vulnerability in FreeType was discovered and reported by our KNOW platform. Netenrich’s KNOW is not just a threat intel dashboard, but it also happens to be a news aggregator serving up the latest and hottest stories in the cybersecurity space. Since today’s topic of the day is “vulnerabilities,” let’s see how we can leverage KNOW’s feed to educated ourselves about the most trending vulnerabilities in the global threat landscape.

Sounds interesting? Get to KNOW

Investigating Zero-Day Attack with KNOW

In this particular story, KNOW has detected two Zero-Day Attack vulnerabilities which could provide more context into the problem discussed above:

  • CVE-2019-13720
  • CVE-2020-6418

Now, let’s look into each of them and see what we can learn.

Zero Day Attack Vulnerability 1: CVE-2019-13720

617 Reference(s) to this entity
First seen: 31 Oct, 2019
Last seen: 21 Oct, 2020
Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Products Affected: Google, Chrome, Chrome 78.0.3904.87

Risk rules triggered: 4 out of 48 rule(s) triggered

Historically Linked To Campaign: 1 sighting(s)

Related Campaign: Operation WizardOpium.

Historically Linked To Threat Research: 5 sighting(s)

Related Intrusion Methods: Zero Day, Use-After-free, Watering Hole Attack, Privilege Escalation.

Historic Sandbox Sighting: 2 sighting(s)

Most recent reference: Hybrid Analysis result for ‘file’

CVE-2019-13720 reference count

See how Netenrich detects and resolves CVE-2019-13720

Zero Day Attack Vulnerability 2: CVE-2020-6418

CVE-2020-6418177 Reference(s) to this entity
First seen: 24 Feb, 2020
Last seen: 21 Oct, 2020

Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Products Affected: Google, Chrome, 80.0.3987.122

zero day attack

KNOW more about CVE-2020-6418 and other pernicious beings

Netenrich Threat + Attack Surface Intelligence

KNOW is Netenrich’s Threat Intel Platform that extracts data from billions of data points and correlates relevant intel and expert analyst insights to help you follow, search, and act—in a fraction of the time it takes now. However, Netenrich’s offering isn’t just limited to threat intelligence. We offer a powerful combination of threat and attack surface intelligence.

Threat and Attack Surface Intelligence will help your SecOps to:

  • Find hidden risks to your brand on the public Internet
  • Stay informed about threats in minutes versus hours
  • Act on the most critical threats first
  • Reduce effort and alert fatigue
  • Measure and demonstrate value
Why did we create Knowledge NOW? Read our story

If you want to know more about Netenrich’s Attack Surface Intelligence (ASI), click here.

Hey, before you leave, you might want to read our CISO, Brandon Hoffman’s take on the rise of cyber crimes during U.S. Elections 2020 — as part of our  National Cyber Security Awareness Month series. Sure, take me there


About Author

Tanuj is a storyteller whose ideas and snackable insights are in-sync with dynamic IT operations and modern networks. He likes to develop content that's smartly worded, clutter-breaking, and easy to digest.