Top Russian APT Has a Copycat Among Commercial Spyware Vendors

Published:

spot_img

Russian-Backed Threat Actor APT29 Linked to Multiple Exploit Campaigns Delivering N-day Mobile Exploits

A recent discovery by Google’s Threat Analysis Group (TAG) has uncovered multiple exploit campaigns linked to a Russian-backed threat actor known as APT29, Cozy Bear, and Midnight Blizzard. These campaigns were found to be delivering n-day mobile exploits that had been previously used by commercial spyware vendors.

The exploit campaigns were carried out through a watering hole attack on Mongolian government websites, specifically targeting cabinet.gov.mn and mfa.gov.mn. By injecting code to exploit known vulnerabilities in iOS and Chrome on Android, the threat actors aimed to compromise visitors’ devices.

Researchers at Google TAG noted that the exploits used in these campaigns were identical to those employed by commercial surveillance vendors Intellexa and NSO Group, indicating a potential connection between the authors and providers.

Despite the patches released for the vulnerabilities, the exploit campaigns resurfaced on three separate occasions, with the latest attack occurring just a month ago. The researchers emphasized the concerning trend of threat actors repurposing exploits originally developed by the commercial surveillance industry for malicious purposes.

While the source of these exploits remains unclear, the incident underscores the increasing threat posed by the reuse of exploits by malicious actors. As the cybersecurity landscape continues to evolve, vigilance and collaboration among researchers, industry, and governments will be crucial in mitigating these risks.

spot_img

Related articles

Recent articles

Kaspersky Report Reveals 1 Million Banking Accounts Compromised as E-Commerce Scams Surge to 85% of Financial Phishing in the Middle East

Kaspersky Report Reveals 1 Million Banking Accounts Compromised as E-Commerce Scams Surge to 85% of Financial Phishing in the Middle East In a significant shift...

The Strategic Framework Strengthening Security in Hospitality by 2026

The Strategic Framework Strengthening Security in Hospitality by 2026 The hospitality industry is evolving into a complex ecosystem where security plays a pivotal role in...

Hackers Exploit Kali Forms Vulnerability to Achieve Remote Code Execution on WordPress Sites

Hackers Exploit Kali Forms Vulnerability to Achieve Remote Code Execution on WordPress Sites A newly uncovered vulnerability in the Kali Forms plugin, a popular drag-and-drop...

Australia’s Social Media Ban Under Scrutiny as 60% of Children Continue Access

Australia’s Social Media Ban Under Scrutiny as 60% of Children Continue Access Australia's recent social media ban is encountering significant scrutiny following new research indicating...