Hackers working for governments last year were responsible for most of the zero -day exploitation used in real -world cybertics. New research from Google.
Google’s report stated that the number of Zero day Citing exploitation-security flaws, which was unknown to the software makers, the hackers abused them in-2023 with 98 feats to 75 exploitation in 2024. But the report states that Google can identify hackers who exploit them due to zero days.
Among these 23 achievements, 10 zero days were attributed to hackers working directly for governments, including five China -related achievements and five more from North Korea.
The more eight achievements were identified by which developed by Spyware makers And supervisor, such as NSO groups, who usually claim to be sold to governments only. In the eight achievements developed by Spyware companies, Google is also counting Worm They were Recently exploited Serbian authorities using Selbrite phone unlocking devices.

Despite the fact that Spyware makers, Google’s Threat Intelligence Group (GTIG) security engineer, Clement Lesin presented eight recorded events of zero, told Tech Crunch that the companies were “exposing their capabilities and ending in the news.”
Google added that surveillance shopkeepers continue to spread.
“In instances where law enforcement or public revelations have dropped shopkeepers out of business, we have seen that new shopkeepers are born to provide similar services,” James Sadosky, a prominent GTIG analyst, told Tech Crunch. “As long as government consumers continue to request and payment of these services, the industry will continue to increase.”
The remaining 11 attributed zero day was likely to be by cyber criminals, such as Renasmare operators Targeting enterprise devicesIncluding VPNS and routers.
The report also revealed that the total 75 -day -old Zero -day -olds were targeting consumer platforms and products, such as phones and browsers, who were exploited during 2024. While the rest of the exploited devices are commonly found on corporate networks.
According to Google reports, the good news is that software makers who defend from zero -day attacks are making insects more difficult for exploitation.
According to the report, “We are seeing a significant reduction in the exploitation of zero exploitation of historically popular targets such as browsers and mobile operating systems.
Sadoski specifically indicated Lockdown modeA special feature for iOS and MacOS that disables some functionality with the purpose of tightening cell phones and computers, which has proved Track Record Stopping official hackers; As well as Memory tagging extension (MTE), the security feature of the modern Google Pixel chip sets that helps improve some types of insect detection and the safety of the device.
Reports like Google are valuable because they give to the industry, and observers, statistics points that help in our understanding of how government hackers work-even if a hereditary challenge with zero-day counting is, according to nature, some of them are not known, and some are not known.