The attacks exploited CVE-2019-5786, a security flaw and the only patch included in the Chrome 72.0.3626.121 version, released last Friday, March 1, 2019.
According to an update to its original announcement and a tweet from Google Chrome's security lead, the patched bug was under active attacks at the time of the patch.
Google described the security flaw as a memory management error in Google Chrome's FileReader --a web API included in all major browsers that lets web apps read the contents of files stored on the user's computer.
More specifically, the bug is a use-after-free vulnerability, a type of memory error that happens when an app tries to access memory after it has been freed/deleted from Chrome's allocated memory. An incorrect handling of this type of memory access operation can lead to the execution of malicious code.
According to Chaouki Bekrar, CEO of exploit vendor Zerodium, the CVE-2019-5786 vulnerability allegedly allows malicious code to escape Chrome's security sandbox and run commands on the underlying OS.
Besides revealing exploitation attempts, the browser maker also gave credit to the security researcher who discovered the bug --Clement Lecigne of Google's Threat Analysis Group.
Last month, speaking at a security conference in Israel, Microsoft security engineer Matt Miller said that roughly 70 percent of all security bugs that Microsoft patches every year are memory safety errors like the one the Chrome team patched last week.
Most of the errors come from using C and C++, two "memory-unsafe" programming languages, also used for the Chromium source code, the open source project on which Google Chrome is based on.
Google Chrome users are advised to use the browser's built-in update tool to trigger an update to 72.0.3626.121 version. Users should do this right now, especially when the advice comes from Google Chrome's security lead.