Hi Guys,

I hope you’re well. I’ve kept this article as simple as possible so that it can be read and understood by all our users. Let me know if you have any questions or need me to clarify any points.

Recently, cybersecurity researchers from the Google Threat Analysis Group (TAG) reported on a series of new zero-day exploits used to install commercial spyware on Android and iOS devices and Chrome browsers. You can read their full report HERE, but in a nutshell:

Here’s what you need to know about these threats:

Exploit Chains Target Android and iOS Users.
In November 2022, Google’s Threat Analysis Group (TAG) discovered several exploit chains targeting Android and iOS users. Attackers utilized these chains to install commercial spyware and malicious apps on their targets’ devices. The campaigns exploited vulnerabilities in both operating systems and took advantage of the delays between patch releases and full deployment on end-user devices.

Android and iOS Devices Compromised via Text Messages.
Attackers targeted Android and iOS users with separate exploit chains. They sent text messages with shortened bit.ly links to redirect victims to legitimate shipping websites after sending them through pages that triggered zero-day exploits on both platforms. These vulnerabilities allowed the attackers to track the victims’ locations and install spyware on their devices.

Chrome Zero-Day Exploits Used in Attacks
In addition to Android and iOS vulnerabilities, the attackers also used zero-day exploits in Chrome to compromise devices. These included a Chrome GPU sandbox bypass (CVE-2022-4135), an ARM privilege escalation bug (CVE-2022-38181), and a Chrome type confusion bug (CVE-2022-3723). Google TAG has since reported that some vendors, such as Pixel, Samsung, Xiaomi, and Oppo, did not incorporate patches for these vulnerabilities, allowing attackers to exploit them for several months.

Highly-Targeted Campaigns and Sharing of Exploit Techniques
The attackers exploited the time gap between the release of security fixes and their deployment on end-user devices. Furthermore, the campaigns suggest that exploit techniques may be shared between surveillance vendors, enabling the proliferation of dangerous hacking tools.

These findings, to be honest, have sent a chill down my spine. Most users think that iOS is secure, but it is not. It may be secured against the more simplistic attack vectors, but as you can see from these findings, iOS is not secure. This report is just the tip of the iceberg regarding how vulnerable we all are to being spied on by government, police and commercial spy companies.

As a user of Incognito, it’s essential to keep the app updated on your phone. Incognito is designed to scan for, find, and remove the world’s top commercial surveillance tools that threaten your privacy and security. By ensuring Incognito is up-to-date, you are taking an essential step to protect your device from the latest threats and vulnerabilities. With new exploits and malware emerging constantly, staying current with updates provides the best possible defense against potential cyberattacks and helps maintain your digital privacy.

Let me know if you need any assistance or advice. Always here for you 🙂

Max