zero day Exploits have recently set a trend with the increasing number of reported cases coming to light. Even though there is a significant acceleration in the number of vendors patching security vulnerabilities over the past 2 years, according to a report by hitechglitzHackers too, it seems, have gotten faster at detecting and exploiting these vulnerabilities.
One of them particularly plagues Google’s Chrome, which is currently infected with a “high-severity” vulnerability that is being actively exploited in the wild.
Some of the browsers that use Chrome’s open-source Chromium code base include:
- Microsoft Edge
- Comodo Dragon
After patching a severe Chromium Zero-Day flaw, CVE-2022-0609, in the Animation component on February 14, 2022, Google Chrome was once again hit by another vulnerability in its system. CVE-2022-1096, a “type confusion” issue blocked Google.
As reported by an anonymous researcher on March 23, 2022, the vulnerability was almost fixed by posting an update to mitigate all potential threats. Google has acknowledged that it is aware of an exploit for CVE-2022-1096 in the wild and advised its users to update to the latest version.
Type Confusion Vulnerability
A type confusion error occurs when an object is passed to code without the program checking it first. The code then uses this information without type checking, resulting in type confusion.
This is particularly dangerous because it leads to out-of-bounds access in languages that are not memory-safe, such as C and C++. Additionally, bad function pointers or bad data placed in the wrong piece of code can, in some cases, lead to a crash or possible code execution.
WHAT ARE ZERO-DAY VULNERABILITIES?
Zero-day vulnerabilities refer to newly discovered flaws in the system that go unpatched, leaving them defenseless against social engineering attacks. It is called “zero-day” because it is first discovered by attackers before a security analyst can detect it.
These undetected flaws in the system can compromise a company’s networks or operations, making it a serious security threat.
Attacks typically come in the form of malware that is delivered to an unpatched vulnerability in a web browser or application. The malware, which is sent via email, is injected into the system by clicking on suspicious links or downloading the infected attachment in the email.
Zero-day exploit can lead to confidential data theft, critical file corruption, device takeover, etc. Data leak prevention blueprints can help solve this problem.
Some related terms to understand zero-day vulnerabilities:
- Zero Day Exploits – Social engineering methods to execute attacks.
- Zero day attacks – Attacks that take advantage of vulnerabilities to cause data breaches in an organization.
HOW ZERO-DAY ATTACKS ARE PERFORMED
Software developed in an enterprise contains a vulnerability that the developer is unaware of — Threat actors spot it and act on it before it is discovered by the developer — Methods to exploit it are then executed while that it is not patched — a Zero-day exploit — Noticed by someone as a data theft — The developer is creating a patch for this.
SOME FAMOUS ZERO-DAY ACHIEVEMENTS –
- AURORA – A series of cyberattacks launched from China that targeted US private sector companies in 2010. A phishing campaign was launched by threat actors to steal trade secrets from Yahoo, Adobe, Morgan Stanley, Google and more two dozen companies that compromised their networks.
- ALI BABA – For 8 months, Alibaba’s shopping website was taken over by web crawler developed by an anonymous developer in November 2019 to collect over 1.1 billion user details such as user IDs users, mobile phone numbers and customer reviews.
- STUXNET- A computer virus attack believed to have been carried out by the US and Israeli governments to prevent Iran from building nuclear weapons. It is considered the world’s first cyber weapon.
WAYS TO COUNTER A ZERO-DAY ATTACK –
The best way to prevent any cyberattack from happening in the first place is to maintain a good firewall and up-to-date antivirus. He ensures the server security.
- A Web Application Firewall (WAP) is the first line of defense in network security. It forms a barrier between the internal network of trust and the external network, such as the Internet. Inspection of inbound and outbound traffic can identify and block threats.
- IT security assessment also plays a major role in securing networks. Network security testing can help improve the overall security of your networks by:
- Continuously identify threats to networks.
- Checking security access control.
- Network-based intrusion analysis.
- Apply patches as they become available to fix vulnerabilities. They can also help fix previous vulnerabilities by providing updated software.
Additionally, since zero-day vulnerabilities are intimidating enough to be considered a high-priority threat, performing VAPT can help. VAPT Thoroughly scans a network to detect any exploitable vulnerabilities present in it. It’s a surefire way to ensure the security of your organization’s IT infrastructure.
CYBERSECURITY WITH KRATIKAL
Like a CERT-In incorporated company, Kratikal strongly hopes for a world without cybercrime. For the security of your systems, we offer the full suite of Vulnerability Assessment and Penetration Testing (VAPT) services such as web application security testing, network security testing, medical security testing and many more. These testing services identify all security vulnerabilities in a system to protect against possible social engineering attacks.
As a new day arrives, so does the report of a new Zero-day vulnerability attack. It has become a big enough problem to warrant the full attention of vendors and hackers.
Vulnerabilities in a system are inevitable, but don’t be discouraged.
Where there is a problem, there is always a solution hidden down there somewhere!
What do you propose to fight against zero-day vulnerabilities? Comment below!
The post TYPE-CONFUSION: THE NEW ZERO-DAY VULNERABILITY FACING GOOGLE’S CHROME first appeared on Kratikal Blogs.
*** This is a syndicated blog from the Kratikal Blogs Security Bloggers Network written by Deepti Sachdeva. Read the original post at: https://www.kratikal.com/blog/type-confusion-the-new-zero-day-vulnerability-plaguing-googles-chrome/