/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Google says Russia-linked APT29 is using exploits that are “identical or strikingly similar” to those previously made by spyware makers Intellexa and NSO Group

Google says it has evidence that Russian government hackers are using exploits that are “identical or strikingly similar” …

TechCrunch Zack Whittaker

Discussion

  • @fj@mastodon.social Frederic Jacobs on mastodon
    “Our latest n-day exploit reporting shows that in an attack on Mongolian government websites, Russian-backed APT29 is suspected of using the same exploits as Intellexa and NSO”  —  https://blog.google/...
  • @zackwhittaker@mastodon.social Zack Whittaker on mastodon
    New, by me: Google's Threat Analysis Group found evidence that a group of Russian government hackers, aka APT29, are using exploits that are “identical or strikingly similar” to those previously made by spyware makers Intellexa and NSO Group. …
  • @lorenzofb Lorenzo Franceschi-Bicchierai on x
    NEW: Google found evidence that a group of Russian government hackers, aka APT29, are using exploits that are “identical or strikingly similar” to those previously made by spyware makers Intellexa and NSO Group. https://techcrunch.com/...
  • @danwblack Dan Black on x
    Important report highlighting the SVR's wider enablers: “In each iteration of the watering hole campaigns, [APT29] used exploits that were identical or strikingly similar to exploits previously used by commercial surveillance vendors Intellexa and NSO Group.”
  • @charley_snyder_ Charley Snyder on x
    Noteworthy new research here on APT29 use of old NSO and Intellexa exploits. In my opinion, this is yet more evidence that the proliferation of commercial hacking capabilities — sometimes into the hands of apex teams like APT29 — poses a serious threat to the web.
  • @arawnsley Adam Rawnsley on x
    “In each iteration of the watering hole campaigns, the attackers used exploits that were identical or strikingly similar to exploits previously used by commercial surveillance vendors (CSVs) Intellexa and NSO Group.” https://blog.google/...
  • @bushidotoken Will on x
    Latest 🇷🇺 APT29 (Cozy Bear, Midnight Blizzard) activity below 👇
  • @billyleonard Billy Leonard on x
    🆕🚨 New analysis from @Google TAG on suspected APT29 waterholes against 🇲🇳 gov. n-day exploits targeting iOS and Android we first observed in use from commercial surveillance vendors🫢 more details in the blog! awesome work from @_clem1 and team🤝 https://blog.google/...