๐ชฒ New blog from me, Clem, and Kristen on the Zimbra in-the-wild 0-day, CVE-2023-37580, discovered by TAG in the summer. We discovered 4 different campaigns using the bug against organizations in Greece, Moldova, Tunisia, Vietnam, and Pakistan.
https://blog.google/threat-analysis-group/zimbra-0-day-used-to-target-international-government-organizations/

Zimbra 0-day used to target international government organizations
TAGโs discovery of a 0-day exploit used to steal email data from international government organizations.
Google๐ฎNEW RCA!! A few hours after it was patched, TAG found an ITW exploit sample for CVE-2023-36802. @benoitsevens analyzed it in detail โจ
https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-36802.html
CVE-2023-36802: Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
Information about 0-days exploited in-the-wild!
0-days In-the-WildNorth Korean actors ๐ฐ๐ตโ are targeting security researchers again including the use of at least one 0-day. IOCs in blog โฌ๏ธโ If you've been in contact, please reach out
https://blog.google/threat-analysis-group/active-north-korean-campaign-targeting-security-researchers/

Active North Korean campaign targeting security researchers
Threat Analysis Group shares findings on a new campaign by North Korean actors targeting security researchers.
GoogleGoogle's 2022 Year in Review of in-the-wild 0-days is out! 4 key takeaways:
๐ค N-days function like 0-days on Android
โก๏ธ 0-clicks and new browser mitigations drive down browser 0-days
๐ฏ Over 40% of itw 0-days are variants
๐ฅ Bug collisions are high
#itw0days
https://security.googleblog.com/2023/07/the-ups-and-downs-of-0-days-year-in.html

The Ups and Downs of 0-days: A Year in Review of 0-days Exploited In-the-Wild in 2022
Maddie Stone, Security Researcher, Threat Analysis Group (TAG) This is Googleโs fourth annual year-in-review of 0-days exploited in-the-wild...
๐ฏ New RCA up for CVE-2022-4135, a Chrome itw 0-day that was patched in November!! The bug was discovered by Clement and the RCA authored by Sergei. #itw0days
https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2022/CVE-2022-4135.html
CVE-2022-4135: Chrome heap buffer overflow in validating command decoder
Information about 0-days exploited in-the-wild!
0-days In-the-WildCVE-2022-41033: Type confusion in Windows COM+ Event System Service
Information about 0-days exploited in-the-wild!
0-days In-the-WildSecurity Update Guide - Microsoft Security Response Center
Hiii! I'm taking 6 weeks off work to rest and recharge so won't be back on here until Jan. This is what I've done with my first week and a half off so far. This project will be on hold for a bit though as it's time for me to go on a surf vacation! ๐๐ฝโโ๏ธโ See you in 2023!