Maddie Stone

7K Followers
41 Following
34 Posts
Security Researcher at Google Project Zero | 0-days exploited in-the-wild |
Twitterhttps://twitter.com/maddiestone
Websitehttps://ragingrock.com

๐Ÿชฒ New blog from me, Clem, and Kristen on the Zimbra in-the-wild 0-day, CVE-2023-37580, discovered by TAG in the summer. We discovered 4 different campaigns using the bug against organizations in Greece, Moldova, Tunisia, Vietnam, and Pakistan.

https://blog.google/threat-analysis-group/zimbra-0-day-used-to-target-international-government-organizations/

Zimbra 0-day used to target international government organizations

TAGโ€™s discovery of a 0-day exploit used to steal email data from international government organizations.

Google

๐Ÿ”ฎNEW RCA!! A few hours after it was patched, TAG found an ITW exploit sample for CVE-2023-36802. @benoitsevens analyzed it in detail โœจ

https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-36802.html

CVE-2023-36802: Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability

Information about 0-days exploited in-the-wild!

0-days In-the-Wild

"Hi, I'm Maddie, and I really really like zero day exploits"

@maddiestone from Google Threat Analysis Group (TAG) kicking off the Friday keynote at #BSides #BSidesAU #BSidesCbr2023

The legendary and amazing @maddiestone    doing a keynote @bsidescbr. Such an amazing talk! super stoked to hear her in person.

Thank you @maddiestone for sharing with us your wisdom!  

North Korean actors ๐Ÿ‡ฐ๐Ÿ‡ตโ€‹ are targeting security researchers again including the use of at least one 0-day. IOCs in blog โฌ‡๏ธโ€‹ If you've been in contact, please reach out

https://blog.google/threat-analysis-group/active-north-korean-campaign-targeting-security-researchers/

Active North Korean campaign targeting security researchers

Threat Analysis Group shares findings on a new campaign by North Korean actors targeting security researchers.

Google

Google's 2022 Year in Review of in-the-wild 0-days is out! 4 key takeaways:
๐Ÿค– N-days function like 0-days on Android
โšก๏ธ 0-clicks and new browser mitigations drive down browser 0-days
๐Ÿ‘ฏ Over 40% of itw 0-days are variants
๐Ÿ’ฅ Bug collisions are high

#itw0days

https://security.googleblog.com/2023/07/the-ups-and-downs-of-0-days-year-in.html

The Ups and Downs of 0-days: A Year in Review of 0-days Exploited In-the-Wild in 2022

Maddie Stone, Security Researcher, Threat Analysis Group (TAG) This is Googleโ€™s fourth annual year-in-review of 0-days exploited in-the-wild...

๐ŸŽฏ New RCA up for CVE-2022-4135, a Chrome itw 0-day that was patched in November!! The bug was discovered by Clement and the RCA authored by Sergei. #itw0days

https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2022/CVE-2022-4135.html

CVE-2022-4135: Chrome heap buffer overflow in validating command decoder

Information about 0-days exploited in-the-wild!

0-days In-the-Wild

๐Ÿ‘€ New RCA up for CVE-2022-41033, a type confusion in Windows COM+ Event System Service by @tiraniddo !
#itw0days

https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2022/CVE-2022-41033.html

CVE-2022-41033: Type confusion in Windows COM+ Event System Service

Information about 0-days exploited in-the-wild!

0-days In-the-Wild

First in-the-wild 0-day of 2023 ๐Ÿ”ฅ

CVE-2023-21674: Windows ALPC elevation of privilege discovered by Avast

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21674

All 2023 itw 0-days will be tracked here: https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=1746868651

#itw0days

Security Update Guide - Microsoft Security Response Center

Hiii! I'm taking 6 weeks off work to rest and recharge so won't be back on here until Jan. This is what I've done with my first week and a half off so far. This project will be on hold for a bit though as it's time for me to go on a surf vacation! ๐Ÿ„๐Ÿฝโ€โ™€๏ธโ€‹ See you in 2023!