therecord.media
Open in
urlscan Pro
2606:4700::6812:1125
Public Scan
URL:
https://therecord.media/android-zero-day-google-fix-august-patch
Submission: On August 07 via api from TR — Scanned from US
Submission: On August 07 via api from TR — Scanned from US
Form analysis
1 forms found in the DOM<form><span class="text-black text-sm icon-search"></span><input name="s" placeholder="Search…" type="text" value=""><button type="submit">Go</button></form>
Text Content
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. Accept * Leadership * Cybercrime * Nation-state * Elections * Technology * Cyber Daily® * Click Here Podcast Go Subscribe to The Record ✉️ Free Newsletter Image: Daniel Romero via Unsplash / Photomosh Daryna Antoniuk August 6th, 2024 * News * News Briefs * Technology * * * * * Get more insights with the Recorded Future Intelligence Cloud. Learn more. GOOGLE SAYS ANDROID ZERO-DAY WAS EXPLOITED IN THE WILD Google has patched a “high-severity” vulnerability that may be “under limited, targeted exploitation” in Android devices. In an advisory on Monday, Google said that the bug, tracked as CVE-2024-36971, impacts the Linux kernel — a core component of an operating system that serves as a bridge between the software and the physical hardware of a computer. The vulnerability allows hackers to remotely execute code on the affected device, Google said. The company hasn’t provided any details about specific attacks and which threat actor was behind them. For the exploit to be successful, the attacker would need to have system-level privileges, the highest level of access permissions. Google’s August patch addressed a total of 47 flaws, including those in Arm, Imagination Technologies, MediaTek and Qualcomm components. Most of them have been assigned a “high severity” rating. The new Android zero-day was discovered by Clement Lecigne of Google's Threat Analysis Group. He previously mostly reported on zero-day flaws exploited in espionage attacks. Earlier this year, researchers from Google warned that zero-day exploits — those that be used to compromise devices before anyone is aware they’re vulnerable — have become more common as nation-state hackers and cybercriminals find sophisticated ways to carry out their attacks. In a report in March, Google said it observed 97 zero-days exploited in the wild in 2023, compared to 62 in 2022 — a 50 percent increase. Forty-eight of the vulnerabilities were attributed to espionage actors while the remaining 49 were attributed to financially-motivated hackers. * * * * * Tags * zero-day * Android * Google * Vulnerability * mobile * Linux Previous articleNext article Hackers remotely wipe 13,000 students’ iPads and Chromebooks after breaching safety software Venezuelan government ratchets up digital repression surrounding tainted election Daryna Antoniuk is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post. BRIEFS * Google says Android zero-day was exploited in the wildAugust 6th, 2024 * Hackers remotely wipe 13,000 students’ iPads and Chromebooks after breaching safety softwareAugust 6th, 2024 * Singapore police wrest back $41 million stolen from commodities firm in BEC scamAugust 5th, 2024 * Cyberattack cost more than $17 million, Key Tronic tells regulatorsAugust 5th, 2024 * European Commission forces TikTok rewards program to shut down on the continentAugust 5th, 2024 * Ukrainian police detain man who offered services to Russian intelligence on darknetAugust 5th, 2024 * China-based Evasive Panda hackers compromised an ISP to spread malware, report saysAugust 2nd, 2024 * Five Chinese nationals arrested by feds for 'massive' elder fraud scheme August 2nd, 2024 * Judge says maker of Pegasus spyware does not need to provide sought-after Israeli witnesses in WhatsApp caseAugust 2nd, 2024 PRODUCTION AND PROLIFERATION: THE RISKS OF THE BURGEONING IRANIAN DRONE INDUSTRY Production and Proliferation: The Risks of the Burgeoning Iranian Drone Industry "ERIAKOS" SCAM CAMPAIGN: DETECTED BY RECORDED FUTURE’S PAYMENT FRAUD INTELLIGENCE TEAM "ERIAKOS" Scam Campaign: Detected by Recorded Future’s Payment Fraud Intelligence Team DESPITE SANCTIONS, NORTH KOREANS CONTINUE TO USE FOREIGN TECHNOLOGY Despite Sanctions, North Koreans Continue to Use Foreign Technology SECURITY CHALLENGES RISE AS QR CODE AND AI-GENERATED PHISHING PROLIFERATE Security Challenges Rise as QR Code and AI-Generated Phishing Proliferate TAG-100 USES OPEN-SOURCE TOOLS IN SUSPECTED GLOBAL ESPIONAGE CAMPAIGN, COMPROMISING TWO ASIA-PACIFIC INTERGOVERNMENTAL BODIES TAG-100 Uses Open-Source Tools in Suspected Global Espionage Campaign, Compromising Two Asia-Pacific Intergovernmental Bodies * * * * * * Privacy * About * Contact Us © Copyright 2024 | The Record from Recorded Future News