Zero day Exploitors ..Project ‘0’

Fire eye has released a Zero day Exploitors map.. where the exploits are actively used as soon as they are available or reported.. Big players China..Russia..USA are taking their positions.. but the surprise remains to see UAE.. UZBEKISTAN Actively Occupying the list…

Security and intelligence firm FireEye today released a sweeping analysis of how zero days have been exploited worldwide over the last seven years, drawing in data from other security research organizations’ reporting as well as Google Project Zero’s database of active zero days. FireEye was able to link the use of 55 of those secret hacking techniques to state-sponsored operations, going so far as to name which country’s government it believes to be responsible in each case.

The resulting map and timeline, with a tally of which countries have used the most zero days over the last decade, are far from comprehensive. Countries like the US almost certainly have used zero days that remain undetected, FireEye acknowledges, and many others couldn’t be pinned with certainty on any particular country. But it does show how the collection of countries using those hacking techniques now includes less expected players like the United Arab Emirates and Uzbekistan.

That proliferation, FireEye argues, is due at least in part to a rising industry of hackers-for-hire that develop zero-day tools and sell them to intelligence agencies around the world. Any nation with money can buy, rather than build, relatively sophisticated hacking abilities. “Since about 2017 the field has really diversified. We think that this is at least partially due to the role of vendors offering offensive cyberthreat capabilities,” says Kelli Vanderlee, the manager of FireEye’s Intelligence Analysis group. “The biggest barrier between an attacker and a zero-day is not skill, but cash.”

Specifically, FireEye points to NSO Group, Gamma Group, and Hacking Team as the sort of contractors that have enabled a new cadre of countries to buy their way into the zero-day hacking field. NSO Group’s zero days, for instance, have shown up in the hands of espionage-focused hacking groups believed to be associated with the United Arab Emirates, like Stealth Falcon and FruityArmor. Three of those same NSO-linked zero days were also used by a group called SandCat, associated with Uzbekistan’s intelligence agency known as the SSS.


From 2012 to 2015, by contrast, FireEye tied all but three of the 26 zero days it could attribute to Russia and China. The firm linked North Korea, France and Israel to one other zero day apiece during that time period.

As smaller players gain more access to zero days, the top-tier cyberpowers are actually using fewer of them, FireEye’s analysis seems to show. Its timeline lists only two zero days associated with China in the last two years, and none linked to Russia. FireEye’s Vanderlee argues that China and Russia have largely opted to use other techniques in their hacking operation that are often more efficient and deniable: Phishing and commodity hacking tools, stolen credentials and other “living off the land” tactics that abuse existing features to move through victim networks, and so-called “one day” exploits. Sophisticated hackers can often reverse-engineer software updates to quickly develop attacks before the fixes are widespread. It’s a less expensive and time-consuming process than searching out vulnerabilities from scratch.

“Within hours of disclosure of a vulnerability, they’re able to create an exploit and use it,” Vanderlee says. “Waiting for vulnerabilities to be disclosed like this might be a more bang for your buck strategy for these actors, because they don’t have to put in the resources to find a zero day by sifting through software code.”

Given that the flaws are secret by definition, FireEye’s analysts don’t know what they don’t know. “This is not a holistic view of the zero days that exist in the whole world, but the ones that have been found so far,” says Parnian Borazjani, a FireEye analyst.

Other observed zero days also weren’t included because FireEye didn’t have sufficient evidence to attribute them. Notably absent from the timeline is Saudi Arabia, which reportedly used a zero-day in WhatsApp to hack the personal phone of Amazon CEO Jeff Bezos. Aside from eight NSA zero days leaked by the mysterious Shadow Brokers group, and one revealed in the 2017 Vault 7 dump, the US’s hacking tools are also conspicuously missing from the timeline. South Korea is absent too; one of the country’s hacker groups was recently tied to five zero days used to target North Koreans, but that discovery came too late to be included in FireEye’s study.

Incomplete as it may be, FireEye’s data nonetheless point to a disturbing trend: Powerful hacking tools are proliferating. As hacking contractors continue to expand their customer base, expect more flags to show up in more places on the zero day map.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s