Wälder, Wale, Hamster: Was den Artenschwund befeuert – und wie er zu stoppen wäre

Holzeinschlag in Nationalparks, Gasförderung und Militärmanöver im Meeresschutzgebieten – häufig stehen Naturschutzziele nur auf dem Papier. In der Praxis gilt Business as usual

Holzeinschlag in Nationalparks, Gasförderung und Militärmanöver im Meeresschutzgebieten - häufig stehen Naturschutzziele nur auf dem Papier. In der Praxis gilt Business as usual

Foodwatch kritisiert EU: Viele Pestizid-Zulassungen ohne Risikoprüfung verlängert

Fast ein Drittel der Ackergifte in der EU sind betroffen, zeigen Recherchen. Foodwatch fordert Landwirtschaftsminister Cem Özdemir auf, sich für eine Reform des Systems einzusetzen.

Fast ein Drittel der Ackergifte in der EU sind betroffen, zeigen Recherchen. Foodwatch fordert Landwirtschaftsminister Cem Özdemir auf, sich für eine Reform des Systems einzusetzen.

Chrome, Defender, and Firefox 0-days linked to commercial IT firm in Spain

Variston IT fingerprints found in source code for advanced Chrome exploit.

The word ZERO-DAY is hidden amidst a screen filled with ones and zeroes.

Enlarge (credit: Getty Images)

Google researchers said on Wednesday they have linked a Barcelona, Spain-based IT company to the sale of advanced software frameworks that exploit vulnerabilities in Chrome, Firefox, and Windows Defender.

Variston IT bills itself as a provider of tailor-made Information security solutions, including technology for embedded SCADA (supervisory control and data acquisition) and Internet of Things integrators, custom security patches for proprietary systems, tools for data discovery, security training, and the development of secure protocols for embedded devices. According to a report from Google’s Threat Analysis Group, Variston sells another product not mentioned on its website: software frameworks that provide everything a customer needs to surreptitiously install malware on devices they want to spy on.

Researchers Clement Lecigne and Benoit Sevens said the exploit frameworks were used to exploit n-day vulnerabilities, which are those that have been patched recently enough that some targets haven't yet installed them. Evidence suggests, they added, that the frameworks were also used when the vulnerabilities were zero-days. The researchers are disclosing their findings in an attempt to disrupt the market for spyware, which they said is booming and poses a threat to various groups.

Read 10 remaining paragraphs | Comments