Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


Zero-Click, Zero-Warning: The FreeType Flaw Behind a Spyware Surge
Manage episode 490418264 series 3645080
In this episode, we dive deep into the story behind CVE-2025-27363, a critical zero-click vulnerability in the widely used FreeType font rendering library. Initially discovered by Facebook’s security team and patched by Google in May 2025, this flaw allowed attackers to execute arbitrary code on Android devices—without any user interaction—by exploiting how FreeType parsed certain font structures.
This seemingly obscure bug became a key attack vector for Paragon Solutions’ "Graphite" spyware, an Israeli-made surveillance tool capable of taking near-total control of compromised smartphones. Through forensic analysis, it was revealed that Paragon’s spyware leveraged CVE-2025-27363 to infect targets via WhatsApp: malicious PDF files sent through groups triggered the vulnerability, which then deployed Graphite and escaped Android’s sandbox protections. The spyware could then exfiltrate encrypted chats, enable microphones and cameras, and track real-time GPS—without the user’s knowledge.
Our discussion also explores:
- The technical nuances of the vulnerability—how a signed/unsigned integer mismatch led to a dangerous heap overflow.
- The patching timeline, and Google’s move toward replacing FreeType with the safer Rust-based Skrifa library.
- How governments in countries like Australia, Canada, Italy, and Israel are suspected of deploying this spyware.
- The role of The Citizen Lab in uncovering evidence of targeted attacks against journalists, activists, and civil society members—despite Paragon’s public claims of safeguarding human rights.
- Practical advice for detecting spyware infections and why hybrid detection strategies offer the best protection.
Finally, we examine the broader implications for software supply chains, surveillance ethics, and why even basic libraries like font parsers must be designed with security in mind. Tune in for an eye-opening look at how a small coding bug cascaded into a global espionage tool.
198 episodes
Manage episode 490418264 series 3645080
In this episode, we dive deep into the story behind CVE-2025-27363, a critical zero-click vulnerability in the widely used FreeType font rendering library. Initially discovered by Facebook’s security team and patched by Google in May 2025, this flaw allowed attackers to execute arbitrary code on Android devices—without any user interaction—by exploiting how FreeType parsed certain font structures.
This seemingly obscure bug became a key attack vector for Paragon Solutions’ "Graphite" spyware, an Israeli-made surveillance tool capable of taking near-total control of compromised smartphones. Through forensic analysis, it was revealed that Paragon’s spyware leveraged CVE-2025-27363 to infect targets via WhatsApp: malicious PDF files sent through groups triggered the vulnerability, which then deployed Graphite and escaped Android’s sandbox protections. The spyware could then exfiltrate encrypted chats, enable microphones and cameras, and track real-time GPS—without the user’s knowledge.
Our discussion also explores:
- The technical nuances of the vulnerability—how a signed/unsigned integer mismatch led to a dangerous heap overflow.
- The patching timeline, and Google’s move toward replacing FreeType with the safer Rust-based Skrifa library.
- How governments in countries like Australia, Canada, Italy, and Israel are suspected of deploying this spyware.
- The role of The Citizen Lab in uncovering evidence of targeted attacks against journalists, activists, and civil society members—despite Paragon’s public claims of safeguarding human rights.
- Practical advice for detecting spyware infections and why hybrid detection strategies offer the best protection.
Finally, we examine the broader implications for software supply chains, surveillance ethics, and why even basic libraries like font parsers must be designed with security in mind. Tune in for an eye-opening look at how a small coding bug cascaded into a global espionage tool.
198 episodes
All episodes
×
1 CitrixBleed Returns: CVE-2025-5777 and the Exploitation of NetScaler Devices 1:02:21

1 SAP’s July 2025 Patch Day: Critical Flaws, CVE-2025-30012, and Ransomware Risk 1:02:01

1 106GB Exposed? Telefónica, HellCat, and the Silent Data Breach 50:33

1 Ingram Micro’s SafePay Ransomware Breach: Human-Operated Threats and Supply Chain Fallout 59:56

1 The Illusion of Shutdowns: What Hunters International's Closure Really Means 42:41

1 CISA Flags CVE-2025-6554: Patching Chrome’s Critical Flaw Before It’s Too Late 40:49

1 ANSSI vs. Houken: France Battles Advanced Chinese Hacking Threat 33:16

1 Psychological Manipulation and AI Fraud: How Spain Exposed a $12M Scam 17:21

1 CVE-2025-20309: Critical Cisco Root Access Flaw Threatens VoIP Security 41:32

1 macOS Under Siege: NimDoor Malware Targets Telegram, Wallets, and Keychains 43:09

1 Cisco Unified CM Vulnerability: Root Access Risk for Enterprise VoIP Networks 56:02

1 Forminator Flaw Exposes WordPress Sites to Takeover Attacks: Vulnerability Threatens 600,000+ Sites 50:32

1 Kelly Benefits Breach: Over 550,000 Victims and the Rising Identity Theft Crisis 1:08:04

1 FileFix, HTA, and MotW Bypass—The Alarming Evolution of HTML-Based Attacks 46:04

1 Sophisticated Cyberattack on the International Criminal Court: Justice in the Crosshairs 19:37

1 Critical Flaws in Microsens NMP Web+ Threaten Industrial Network Security 43:40

1 Qantas Data Breach: Third-Party Hack Exposes Millions of Frequent Flyers 24:36

1 Berlin Regulator Targets DeepSeek AI Over Data Transfers to China 43:41

1 CISA Flags Citrix NetScaler Flaws: What CVE-2025-6543 Means for Federal and Private Networks 56:41

1 Cato Networks Secures $359M to Fuel AI-Powered SASE Expansion 17:12

1 Chrome’s Latest Zero-Day: CVE-2025-6554 and Remote Code Execution Risks 54:24

1 Russia’s 16KB Curtain: Cloudflare Throttling and the Future of the RuNet 1:45:31

1 Ahold Delhaize Data Breach: 2.2 Million Employee Records Exposed 37:44

1 Why Canada Banned Hikvision: National Security vs. Geopolitics 52:07

1 Scattered Spider Takes Flight: Inside the Cybercrime Group’s Move into Aviation 43:38

1 Fortnite and the FTC: How Epic Games Misled Players into Unwanted Purchases 54:56

1 Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages 41:44

1 Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Risk 47:26

1 CitrixBleed 2: Critical NetScaler Vulnerability Enables Session Hijacking and MFA Bypass 18:41

1 OneClik Cyberattack Campaign Targets Energy Sector Using Microsoft ClickOnce and AWS 1:18:25
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.