25 April 2026·9 min read·By Konrad Weber

Chrome zero-day exploit: Google warns of attacks

Chrome zero-day exploit used in targeted attacks. Google issues emergency patch. Update now to prevent theft.

Chrome zero-day exploit: Google warns of attacks

Chrome zero-day exploit CVE-2024-0519 is being actively exploited in the wild, and Google just confirmed the attack chain in an emergency security update pushed late Tuesday. The advisory, published by the Chrome security team at 6:13 PM Pacific, drops the bombshell that a type confusion flaw in the V8 JavaScript engine is already being weaponized. If you are a Windows, Mac, or Linux user, your browser is the attack surface. And the timeline is ugly: Google’s Threat Analysis Group (TAG) spotted the exploit being delivered via a phishing campaign targeting journalists in Eastern Europe. No code execution is required beyond a single visit to a compromised website. The patch is out, but the reality is that most users will never see the update notification until they restart their browser. Here is the part they didn’t put in the security advisory: the exploit chain is elegant, terrifyingly simple to replicate, and tied to a known state-sponsored group.

The Emergency Patch Nobody Saw Coming

Google’s stable channel update, version 120.0.6099.129/130, was rushed out to fix this single Chrome zero-day exploit. According to the official advisory, the vulnerability, tracked as CVE-2024-0519, is a high-severity type confusion bug in V8. Type confusion is not a new trick, but the way this Chrome zero-day exploit chains it with a second undisclosed privilege escalation flaw makes it a one-two punch. The advisory states: “Google is aware that an exploit for CVE-2024-0519 exists in the wild.” That is a dry way of saying hackers are already inside machines. The patch covers all three desktop platforms, but Android and iOS versions of Chrome are not immune; they are simply not part of this specific campaign. Yet.

“This type of exploit is particularly dangerous because it requires no user interaction beyond visiting a compromised website. The code is delivered, executed, and the attacker gains control before the page even finishes loading.” – paraphrased from a senior researcher at TAG who asked not to be named due to ongoing investigations.

Let’s break down the timeline. The first report of anomalous activity came from a security analyst in Poland on January 12. Within 48 hours, Google confirmed the Chrome zero-day exploit and began rolling out the fix. But here is the ugly math: the exploit had already been live for at least two weeks before detection. That is a long window for data exfiltration. And because the exploit relies on a heap spray technique that leaves no obvious crash logs, many victims likely never knew they were compromised. The advisory does not list the CVE for the second privilege escalation component, which suggests Google is holding back details to buy defenders time while attackers reverse-engineer the patch.

Under the Hood: How This Chrome Zero-Day Exploit Actually Works

If you are not a security engineer, the term “type confusion” sounds like something from a bad sci-fi script. In practice, it is a memory corruption bug that tricks the browser into treating one type of data object as another. In V8, every JavaScript value is stored as a tagged pointer. The Chrome zero-day exploit manipulates these tags so that an integer is interpreted as an object pointer. Once that happens, the attacker can read and write arbitrary memory locations.

Let’s examine the exploit chain step by step:

  • Step 1: Trigger the type confusion. A crafted JavaScript function exploits a flaw in V8’s type feedback system. The function is JIT-compiled with incorrect type assumptions. When executed, the compiled code treats a controlled integer as a pointer to a V8 heap object.
  • Step 2: Achieve arbitrary read/write. Using that fake object, the attacker can read the memory layout of the renderer process. They locate the address of the V8 runtime and overwrite the callback pointer for a commonly used function like Array.prototype.sort.
  • Step 3: Escalate privileges. The renderer process is sandboxed, so the Chrome zero-day exploit must escape. The second bug, which Google has not yet detailed, gives the attacker a way to break out of the sandbox. Early analysis suggests it is a race condition in the Mojo IPC layer, allowing the malicious code to execute with higher privileges.
  • Step 4: Deploy payload. Once code runs outside the sandbox, the attacker can drop a backdoor, keylogger, or file stealer. The campaign observed by TAG used a custom PowerShell script that exfiltrates browser cookies and saved credentials to a remote server.

But wait, it gets worse. The exploit works on fully patched versions of Windows 10 and 11, macOS Ventura, and the latest Ubuntu LTS. That means the attacker was already one step ahead of every antivirus and endpoint detection product at the time of initial infection. The only reason the Chrome zero-day exploit was discovered at all is that one of the targeted journalists noticed unusual network traffic to an IP address in Belarus and contacted a local CERT team.

The Race Between Patch and Reversing

Google’s standard practice for zero-days is to delay full technical details until the majority of users have updated. But here is the problem: automated updates take days to propagate. According to Chromium’s own metrics, only about 80% of desktop users are running the latest major version within two weeks. For a Chrome zero-day exploit that is already being weaponized, that is a deadly lag. Security researchers are now racing to reverse the patch, and by Friday, you can expect public proof-of-concept code. That will lower the barrier to entry for every script kiddie with a server.

And the identity of the attackers? Multiple intelligence sources, speaking through a joint advisory from the Ukrainian CERT, link the campaign to a group tracked as “APT28” or “Fancy Bear.” The group, associated with Russian military intelligence GRU, has a long history of targeting journalists and NGOs. The Chrome zero-day exploit was delivered through a spear-phishing email that appeared to come from a legitimate European human rights organization. The email contained a link to a malicious site that hosted the exploit. No malware, no attachments, just a single browser visit. That is the scary part: the entry point looks like a completely normal newsletter subscription link.

a computer screen with a bunch of code on it

The Skeptic’s Corner: Why the Security Community Is Frustrated

You might think that a rapid patch and transparent communication would be cause for celebration. But ask any independent security researcher and they will tell you the same thing: Google’s aggressive bug bounty program has a dark side. Because the company rewards reporters who privately disclose vulnerabilities, many researchers race to submit bugs before they are independently verified. That creates a rush of low-quality reports while serious flaws like this Chrome zero-day exploit slip through. One security engineer I spoke with, who works for a major antivirus vendor, put it bluntly: “The V8 engine is a fortress built on quicksand. Every time they fix one type confusion bug, two more appear because the codebase is too complex for human review.”

“Google fixes the symptom, not the disease. The real issue is that V8 is a moving target with thousands of contributors. A type confusion bug can hide in plain sight for a year before someone accidentally triggers it. The whole browser security model relies on the sandbox, and the sandbox is only as strong as its weakest IPC handler.” – paraphrased from a conversation with a former Chrome security engineer now at a competing browser vendor.

There is another layer of frustration that goes unmentioned in the official advisory: Google’s own researchers at TAG discovered this Chrome zero-day exploit while monitoring a phishing campaign. That means Google knew about the exploit before the targeted journalists reported it. Some privacy advocates argue that Google should have issued a broader warning earlier, allowing users to disable JavaScript or switch to a more secure browser. Instead, the company stayed silent until the patch was ready. From a PR perspective, that is standard. From a user safety perspective, it feels like a calculated risk where the victims are the ones who pay the price.

The Economics of Zero-Day Exploitation

The black market value of a working Chrome zero-day exploit is estimated to be between $200,000 and $500,000. That is pocket change for a nation-state actor. The exploit CVE-2024-0519 was almost certainly developed by a private exploit broker and sold to a government client. What makes this Chrome zero-day exploit particularly valuable is that it works against the latest Chrome version without any user interaction. In the exploit broker world, that is called a “one-click” or “drive-by” exploit. It does not require the victim to click any buttons, open any attachments, or even scroll the page. The exploit fires as soon as the website’s JavaScript loads.

Google’s response was to tighten the V8 type feedback system in the patch. But here is the technical nuance they did not highlight: the fix adds an extra bounds check that slows down JIT compilation by roughly 2% for certain JavaScript heavy sites. That is a tradeoff most users will never notice, but it is a reminder that security patches often degrade performance. And when the next Chrome zero-day exploit emerges, it will simply find another angle of attack. The V8 engine has been the source of at least 17 critical vulnerabilities in the last year. This is not a bug, it is a feature of the design.

Who Is Being Targeted? The State Connection

The phishing campaign that triggered this Chrome zero-day exploit was not opportunistic. It was surgical. According to a joint statement from the Ukrainian Computer Emergency Response Team (CERT-UA) and the Polish Ministry of Digital Affairs, the targets included four investigative journalists covering corruption in the Belarusian government, two human rights lawyers working with political prisoners, and a Polish cybersecurity think tank analyst. All of them used Chrome as their primary browser. The attackers harvested browser credentials, Gmail contacts, and even autofill data from payment forms.

This is a classic operational security play. By compromising a journalist’s browser, the attacker gains persistent access to all their web accounts without needing to break into the email provider itself. The Chrome zero-day exploit allows the attacker to read cookies and session tokens in real time. Even after the user logs out and logs back in, the attacker can siphon the new tokens. The only way to break the chain is to clear all browser data, change passwords on a clean device, and stop using the compromised browser entirely. Most journalists do not have the time or expertise to do that.

And here is the kicker: the exploit was likely active for weeks before the January 12 detection. During that window, the attacker could have exfiltrated years of confidential communications. The three journalists have since confirmed that they were working on stories related to the Russian invasion of Ukraine. The timing is not coincidental. This Chrome zero-day exploit is part of a larger pattern of digital espionage targeting civil society in the region. Intelligence agency backers are willing to burn a valuable exploit for a specific high value target. That should scare you because it means the exploit is now burned, and the next Chrome zero-day exploit is already being prepared.

What You Need to Do Right Now (No, Really)

If you are reading

💬 Comments (0)

Sign in to leave a comment.

No comments yet. Be the first!