Governments are hacking the enterprise
A few years ago, zero -day attacks almost exclusively targeted to the closing users. In 2021, GIG looked at 95 days, and 71 of them were deployed against the user system such as Browser And smartphones. In 2024, 33 of the 75 risks were aimed at entering the enterprise technologies and security systems. At 44 % of the total, it is still the most part of the enterprise focus for zero day.
GTIG says it detected zero -day attacks targeting 18 different enterprises, including Microsoft, Google, and Evoti. This is slightly lower than the 22 firms targeted by zero day in 2023, but this is a huge increase compared to just a few years ago, when seven firms were targeted by zero day in 2020.
The nature of these attacks often makes them difficult to find from the source, but Google says it managed to attribute 34 of the 75 -day attacks. The largest only category with the detection of 10 was spying by the traditional state, aimed at collecting intelligence without financial stimulation. China was the largest assistant here. The GTIG also identified North Korea as a criminal in five -day attacks, but these campaigns also had financial stimulus (usually stealing crypto).

This is already a hacking by a lot of government, but GTIG has also noted that eight serious hackers who detect it have been acquired from trading monitoring vendors (CSV), firms that form hacking tools and claim to do business with governments only. So it is appropriate to include them with other government hexes. This includes companies like the NSO group and the cellbrite, the former is already subject to US sanctions with the US nations.
Overall, it increases up to 23 of the 34 governments coming from governments. There were also some attacks that did not technically started with governments, but it still includes espionage activities, suggesting a relationship with state actors. Beyond that, Google saw five non -governmental financially encouraged zero campaigns that do not appear to be spying.
Google security researchers say they expect zero attacks to continue over time. It may be expensive to obtain or discover the weaknesses of the secret, but before anyone gives notice of the risk before anyone gives the risk hackers a wealth of information (or money). Google recommends that businesses continue to detect and increase efforts to detect malicious activities, while systems are also designed with strict limits on waste and access. As far as the average user is concerned, well, cross your fingers.