therecord.media Open in urlscan Pro
2606:4700::6812:1125  Public Scan

URL: https://therecord.media/android-zero-day-google-fix-august-patch
Submission: On August 07 via api from TR — Scanned from US

Form analysis 1 forms found in the DOM

<form><span class="text-black text-sm icon-search"></span><input name="s" placeholder="Search…" type="text" value=""><button type="submit">Go</button></form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept

 * Leadership

 * Cybercrime

 * Nation-state

 * Elections

 * Technology

 * Cyber Daily®

 * Click Here Podcast

Go
Subscribe to The Record

✉️ Free Newsletter


Image: Daniel Romero via Unsplash / Photomosh
Daryna Antoniuk
August 6th, 2024
 * News
 * News Briefs
 * Technology

 * 
 * 
 * 
 * 
 * 

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.


GOOGLE SAYS ANDROID ZERO-DAY WAS EXPLOITED IN THE WILD

Google has patched a  “high-severity” vulnerability that may be “under limited,
targeted exploitation” in Android devices.

In an advisory on Monday, Google said that the bug, tracked as CVE-2024-36971,
impacts the Linux kernel — a core component of an operating system that serves
as a bridge between the software and the physical hardware of a computer.

The vulnerability allows hackers to remotely execute code on the affected
device, Google said. The company hasn’t provided any details about specific
attacks and which threat actor was behind them.

For the exploit to be successful, the attacker would need to have system-level
privileges, the highest level of access permissions.

Google’s August patch addressed a total of 47 flaws, including those in Arm,
Imagination Technologies, MediaTek and Qualcomm components. Most of them have
been assigned a “high severity” rating.

The new Android zero-day was discovered by Clement Lecigne of Google's Threat
Analysis Group. He previously mostly reported on zero-day flaws exploited in
espionage attacks.

Earlier this year, researchers from Google warned that zero-day exploits — those
that be used to compromise devices before anyone is aware they’re vulnerable —
have become more common as nation-state hackers and cybercriminals find
sophisticated ways to carry out their attacks.

In a report in March, Google said it observed 97 zero-days exploited in the wild
in 2023, compared to 62 in 2022 — a 50 percent increase. Forty-eight of the
vulnerabilities were attributed to espionage actors while the remaining 49 were
attributed to financially-motivated hackers.

 * 
 * 
 * 
 * 
 * 

Tags
 * zero-day
 * Android
 * Google
 * Vulnerability
 * mobile
 * Linux

Previous articleNext article
Hackers remotely wipe 13,000 students’ iPads and Chromebooks after breaching
safety software
Venezuelan government ratchets up digital repression surrounding tainted
election

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about
cybersecurity startups, cyberattacks in Eastern Europe and the state of the
cyberwar between Ukraine and Russia. She previously was a tech reporter for
Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent
and The Kyiv Post.


BRIEFS

 * Google says Android zero-day was exploited in the wildAugust 6th, 2024
 * Hackers remotely wipe 13,000 students’ iPads and Chromebooks after breaching
   safety softwareAugust 6th, 2024
 * Singapore police wrest back $41 million stolen from commodities firm in BEC
   scamAugust 5th, 2024
 * Cyberattack cost more than $17 million, Key Tronic tells regulatorsAugust
   5th, 2024
 * European Commission forces TikTok rewards program to shut down on the
   continentAugust 5th, 2024
 * Ukrainian police detain man who offered services to Russian intelligence on
   darknetAugust 5th, 2024
 * China-based Evasive Panda hackers compromised an ISP to spread malware,
   report saysAugust 2nd, 2024
 * Five Chinese nationals arrested by feds for 'massive' elder fraud scheme
   August 2nd, 2024
 * Judge says maker of Pegasus spyware does not need to provide sought-after
   Israeli witnesses in WhatsApp caseAugust 2nd, 2024


PRODUCTION AND PROLIFERATION: THE RISKS OF THE BURGEONING IRANIAN DRONE INDUSTRY


Production and Proliferation: The Risks of the Burgeoning Iranian Drone Industry


"ERIAKOS" SCAM CAMPAIGN: DETECTED BY RECORDED FUTURE’S PAYMENT FRAUD
INTELLIGENCE TEAM


"ERIAKOS" Scam Campaign: Detected by Recorded Future’s Payment Fraud
Intelligence Team


DESPITE SANCTIONS, NORTH KOREANS CONTINUE TO USE FOREIGN TECHNOLOGY


Despite Sanctions, North Koreans Continue to Use Foreign Technology


SECURITY CHALLENGES RISE AS QR CODE AND AI-GENERATED PHISHING PROLIFERATE


Security Challenges Rise as QR Code and AI-Generated Phishing Proliferate


TAG-100 USES OPEN-SOURCE TOOLS IN SUSPECTED GLOBAL ESPIONAGE CAMPAIGN,
COMPROMISING TWO ASIA-PACIFIC INTERGOVERNMENTAL BODIES


TAG-100 Uses Open-Source Tools in Suspected Global Espionage Campaign,
Compromising Two Asia-Pacific Intergovernmental Bodies
 * 
 * 
 * 
 * 
 * 

 * Privacy

 * About

 * Contact Us

© Copyright 2024 | The Record from Recorded Future News