{"id":139710,"date":"2022-05-22T17:03:03","date_gmt":"2022-05-22T22:03:03","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/05\/google-predator-spyware-infected-android-devices-using-zero-days"},"modified":"2022-05-22T17:03:03","modified_gmt":"2022-05-22T22:03:03","slug":"google-predator-spyware-infected-android-devices-using-zero-days","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/05\/google-predator-spyware-infected-android-devices-using-zero-days","title":{"rendered":"Google: Predator spyware infected Android devices using zero-days"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/google-predator-spyware-infected-android-devices-using-zero-days3.jpg\"><\/a><\/p>\n<p>Google\u2019s Threat Analysis Group (TAG) says that state-backed threat actors used five zero-day vulnerabilities to install Predator spyware developed by commercial surveillance developer Cytrox.<\/p>\n<p>In these attacks, part of three campaigns that started between August and October 2021, the attackers used zero-day exploits targeting Chrome and the Android OS to install Predator spyware implants on fully up-to-date Android devices.<\/p>\n<p>\u201cWe assess with high confidence that these exploits were packaged by a single commercial surveillance company, Cytrox, and sold to different government-backed actors who used them in at least the three campaigns discussed below,\u201d said Google TAG members Clement Lecigne and Christian Resell.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google\u2019s Threat Analysis Group (TAG) says that state-backed threat actors used five zero-day vulnerabilities to install Predator spyware developed by commercial surveillance developer Cytrox. In these attacks, part of three campaigns that started between August and October 2021, the attackers used zero-day exploits targeting Chrome and the Android OS to install Predator spyware implants on [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1490,9,1512,1511],"tags":[],"class_list":["post-139710","post","type-post","status-publish","format-standard","hentry","category-government","category-military","category-mobile-phones","category-surveillance"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/139710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=139710"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/139710\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=139710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=139710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=139710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}