“Não está claro como essa proliferação ocorreu, mas isso sugere um mercado ativo para explorações de ‘segunda mão’. Além dessas brechas identificadas, vários agentes de ameaças agora adquiriram técnicas avançadas de exploração que podem ser reutilizadas e modificadas com brechas recém-identificadas”, disse o Google.
Google has observed a concerning trend: the emergence of a secondary market for exploited vulnerabilities. The company stated that it isn’t clear how this proliferation is happening, but the activity suggests a robust trade in previously discovered exploits.
Beyond the specific vulnerabilities identified, Google noted that numerous threat actors have now acquired sophisticated exploitation techniques. These techniques can be repurposed and adapted to take advantage of newly discovered security flaws, amplifying the potential impact of future breaches. This development underscores the increasing sophistication of cyberattacks and the challenges organizations face in maintaining robust security postures.
“It’s not clear how this proliferation occurred, but this suggests an active market for ‘second-hand’ exploits,” Google said. “In addition to these identified vulnerabilities, several threat actors have now acquired advanced exploitation techniques that can be reused and modified with newly identified vulnerabilities.”