TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Google Threat Analysis Group

0-days exploited by commercial surveillance vendor in Egypt

Maddie Stone · 2023-09-22 · Read original ↗

ATT&CK techniques detected

3 predictions
T1557Adversary-in-the-Middle
49%
“reach. if the target is going to a website using ‘ http ’, then the attacker can intercept the traffic and send fake data back to the target to force them to a different website. visiting a website using ‘ https ’ means that the traffic is encrypted, and it is easily verifiable t…”
T1190Exploit Public-Facing Application
45%
“0 - days exploited by commercial surveillance vendor in egypt 0 - days exploited by commercial surveillance vendor in egypt last week google ’ s threat analysis group ( tag ), in partnership with the citizen lab, discovered an in - the - wild 0 - day exploit chain for iphones. de…”
T1588.006Vulnerabilities
32%
“0 - days exploited by commercial surveillance vendor in egypt 0 - days exploited by commercial surveillance vendor in egypt last week google ’ s threat analysis group ( tag ), in partnership with the citizen lab, discovered an in - the - wild 0 - day exploit chain for iphones. de…”

Summary

Last week Google’s Threat Analysis Group (TAG), in partnership with The Citizen Lab, discovered an in-the-wild 0-day exploit chain for iPhones. Developed by the commerci…