Operation AppleJeus & Other Attackers Are Putting The Squeeze on Google Chrome Zero Day

Share This Post

A Google Chrome remote code execution (RCE) zero-day vulnerability is being actively exploited by at least two threat groups, according to Google. Operation AppleJeus and Operation Dream Job have been exploiting this flaw since as early as January 4, 2022.

Originally discovered by North Korean threat actors, the vulnerability allows threat actors to reference memory addresses after they have been freed by Chrome in order to crash the application, use unexpected values, or execute arbitrary code remotely.

Tracked as CVE-2022-1096, a high-priority security patch has been released to update Google Chrome to version 99.0.4844.84 in response. All of the world’s 3,200,000,000 Chrome users are advised to ensure their browsers are updated as a matter of urgency.

iTechPost Summary: https://www.itechpost.com/articles/109748/20220328/google-chrome-security-update-cve-2022-1096-high-severity-zero.htm



Reach out to our incident response team for help

More To Explore

Information Security News – 5/12/2025

Microsoft Sets Passkeys Default for New Accounts Article Link: https://thehackernews.com/2025/05/microsoft-sets-passkeys-default-for-new.html Accenture: What We Learned When Our CEO Got Deepfaked Article Link: https://www.computing.co.uk/event/2025/accenture-what-we-learned-when-our-ceo-got-deepfaked Ghost Students Creating

Information Security News – 5/5/2025

Cloudflare Sees a Big Jump in DDoS Attacks Article Link: https://www.bleepingcomputer.com/news/security/cloudflare-mitigates-record-number-of-ddos-attacks-in-2025/ Bring Your Own Computer Trend Gives Cyber Pros Chills, Yet It’s Here to Stay

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.