Apple has patched an actively exploited zero-day bug in its WebKit browser engine for Safari.
Actively Exploited Apple yesterday described the vulnerability as something an attacker could exploit to execute arbitrary code on affected systems.
CVE-2024-23222 is the first zero-day vulnerability that Apple has disclosed in WebKit in 2024.
Last year, the company disclosed a total of 11 zero-day bugs in the technology - its most ever in a single calendar year.
Since 2021, Apple has disclosed a total of 22 WebKit zero-day bugs, highlighting the growing interest in the browser from both researchers and attackers.
In parallel, Apple's disclosure of the new WebKit zero-day follows on Google's disclosure last week of a zero-day in Chrome.
It marks at least the third time in recent months where both vendors have disclosed zero-days in their respective browsers in close proximity to each other.
The trend suggests that researchers and attackers are probing almost equally for flaws in both technologies, likely because Chrome and Safari are also the most widely used browsers.
The Spying Threat Apple has not disclosed the nature of the exploit activity targeting the newly disclosed zero-day bug.
Researchers have reported seeing commercial spyware vendors abusing some of the company's more recent ones, to drop surveillance software on iPhones of target subjects.
In September 2023, Toronto University's Citizen Lab warned Apple about two no-click zero-day vulnerabilities in iOS that a vendor of surveillance software had exploited to drop the Predator spyware tool on an iPhone belonging to an employee at a Washington, D.C.-based organization.
The same month, Citizen Lab researchers also reported a separate zero-day exploit chain - which included a Safari bug - they had discovered targeting iOS devices.
Google has flagged similar concerns in Chrome, almost in tandem with Apple, on a few occasions recently.
In September 2023 near the same time Apple disclosed its zero-day bugs, researchers from Google's threat analysis group identified a commercial software company called Intellexa as developing an exploit chain - which included a Chrome zero-day - to install Predator on Android devices.
Just a few days earlier, Google had disclosed another zero-day in Chrome in the same image processing library in which Apple had disclosed a zero-day.
Lionel Litty, chief security architect at browser security firm Menlo Security, says it's hard to say if there's any connection between Google and Apple's first browser zero-days for 2024, given the limited information currently available.
Once attackers have found a soft spot in one browser, they are also known to probe other browsers in the same area, Litty says.
Explosion in Zero-Hour Browser-Based Phishing Attacks Surveillance vendors are, by far, not the only ones trying to exploit browser vulnerabilities and browsers in general.
According to a soon-to-be-released report from Menlo Security, there was a 198% increase in browser-based phishing attacks in the second half of 2023 compared to the first six months of the year.
Evasive attacks - a category that Menlo describes as using techniques to evade traditional security controls - surged even higher, by 206%, and accounted for 30% of all browser-based attacks in the second half of 2023.
This Cyber News was published on www.darkreading.com. Publication date: Tue, 23 Jan 2024 23:35:07 +0000