Jakarta, INTI – Google has just released its annual report on cyberattack trends throughout 2024. One of the main findings is quite astonishing: the majority of cyberattacks that occur are from groups that have the support or even direct funding of a country's government.
In the report, Google identified 75 cases of exploitation of zero-day security holes. The term zero-day refers to a vulnerability in software that hasn't been acknowledged or fixed by its developers - making it highly vulnerable to being exploited by hackers.
Who's Behind These Attacks?
Out of a total of 75 incidents, 23 were indicated to have come from state actors, with 10 attacks directly attributed to hackers working for specific governments. Interestingly, five of the attacks were traced to North Korea and another five came from China.
Other countries also named as being involved in these zero-day attacks were Russia and South Korea, each with one incident. Google emphasizes that this data only includes attacks that they managed to detect and verify-the actual numbers could be much higher.
Google’s Countermeasures and Crisis Management
To manage the threats posed by Commercial Surveillance Vendors (CSVs) and state-backed actors, Google actively deploys advanced threat detection and mitigation technologies through its Threat Analysis Group (TAG) and Project Zero. These internal teams are dedicated to identifying zero-day vulnerabilities and working closely with software vendors to patch them swiftly. Moreover, Google emphasizes transparency by routinely publishing threat intelligence reports, thereby alerting users and the cybersecurity community about ongoing threats. These efforts aim not only to neutralize current attacks but also to raise public awareness and improve the overall resilience of the digital ecosystem.
Target: From Enterprises to Individual Users
Although there are 11 attacks launched by cybercriminal groups such as ransomware operators with the main target of business infrastructure, Google emphasizes that the trend of cyberattacks in 2024 is more targeted at individual users. Devices such as smartphones and browser applications are the most frequently exploited vulnerable points.
Conclusion:
Google's latest report shows that cyberattacks are now not only being carried out by criminal groups, but also by state actors with official support or funding. While the number of zero-day exploits decreased compared to the previous year, the threat level remains high - especially as many attacks target personal devices and corporate systems. These findings emphasize the importance of cross-sector collaboration in improving cybersecurity globally.
Read More: Navigating Digital Security Challenges in Indonesia’s Rapidly Evolving Tech Landscape