Hackers working for the governments were responsible for the exploitation of mostly featured zero-days used in real-world cybettacks last year New research from GoogleThe
Google reports that Zero-Day exploitation of the number of exploitation, which hackers were unknown when hackers were tortured to software manufacturers-98 absorption in 2023 had dropped from 75 absorption in 2024. Government -backed hackers.
Of these 20 exploits, 5 zero days were blamed for hackers working directly for the government, of which five are connected to China and five to five North Korea.
Eight more absorbent spyware manufacturers and surveillance enforcement were identified by the NSO group, which usually demanded to sell only to governments. Google is also calculating bugs in these eight absorption made by spyware companies that were recently absorbed by the Serbian authorities using celebrity phone-unlocking devices.
Despite the fact that there are eight recorded cases of zero-day made by spyware makers, Google’s threat Intelligence Group (GTIG) has told Clement Engineer Clement Likigen Techcunch that these companies are investing more operational security to expose their capacity and finish the news. ”
Google has added that surveillance vendors continue to expand.
GTIG chief analyst James Sadovsky told TechCrunch, “The vendors have taken out the business of law enforcement or public publication, we have seen new vendors raised to provide similar services.” “Unless government customers continue to request and payment for these services, the industry will continue to grow.”
The remaining 5 multiplied zero days were probably absorbed by cyber criminal, such as Ranswear operators targeting enterprise devices, including VPNS and routers.
The report also showed that most of the 75 zero-day used in 2021 aims at most of the zero-day phones and browsers targeting platforms and products; The rest of the absorbed devices are usually found in corporate networks.
According to Google reports, the good news is that the software manufacturers defended against zero-day attacks are increasingly making manufacturers growing up buggies.
“We see some historically popular goals such as browser and mobile operating system zero-day exploitation of some historically popular goals.”
Sadovsky specifically points to Lockdown mode, a special feature for iOS and Macos that disables some effectiveness to tighten cellphones and computers, which have proven track records to stop government hackers; As well as Memory tagging extension (MTE), modern Google Pixel chipset is a protection feature that helps to detect certain types of bugs and improve device protection.
Reports like Google are because they give art and observers, data points that contribute to our understanding of how the government hackers manage-the underlying challenge, including zero-day counts, is not identified by nature, some of them are identified and some still go without attribution.

