“These exploit chains are designed for efficiency & flexibility through their modularity,” a researcher with Google’s Project Zero exploit research team wrote. “They are well-engineered, complex code with a variety of novel exploitation methods, mature logging, sophisticated and calculated post-exploitation techniques, and high volumes of anti-analysis and targeting checks. We believe that teams of experts have designed and developed these exploit chains.”Further details can be read at ARS Technica.
Google uncovers complicated hack that used four zero-day exploits
Posted on Thursday, January 14 2021 @ 12:45 CET by Thomas De Maesschalck