Google says Russia-linked APT29 is using exploits that are “identical or strikingly similar” to those previously made by spyware makers Intellexa and NSO Group
Google says it has evidence that Russian government hackers are using exploits that are “identical or strikingly similar” …
TechCrunch Zack Whittaker
Related Coverage
- State-backed attackers and commercial surveillance vendors repeatedly use the same exploits Google · Clement Lecigne
- Google says Russian group targeted Mongolian government with exploits used by NSO Group The Record · Jonathan Greig
- Russian Hackers Using the Same Exploits As Those Deployed by Spyware Vendors PCMag · Michael Kan
- Russian APT29 hackers use iOS, Chrome exploits created by spyware vendors BleepingComputer · Bill Toulas
- Google: apparent Russian hackers play copycat to commercial spyware vendors CyberScoop · Tim Starks
- Powerful Spyware Exploits Enable a New String of ‘Watering Hole’ Attacks Wired · Lily Hay Newman
- Russia's APT29 using spyware exploits in new campaigns Security · Alexander Culafi
- Google reports watering-hole attacks on Mongolian sites leveraged iOS and Android exploits SiliconANGLE · Duncan Riley
- Google Catches Russian APT Reusing Exploits From Spyware Merchants NSO Group, Intellexa SecurityWeek · Ryan Naraine
- Midnight Blizzard delivered iOS, Chrome exploits via compromised government websites Help Net Security · Zeljka Zorz
- Why does this not surprise me and does not astonish me in any way? Well, once an #IT gap is known, it will be exploited #hacking - no matter who uses it for what purpose. — «Russian government hackers found using #exploits made by spyware companies NSO and Intellexa: … @kubikpixel@chaos.social
- Google: “State-backed attackers and commercial surveillance vendors repeatedly use the same exploits” Beehaw
Discussion
-
@fj@mastodon.social
Frederic Jacobs
on mastodon
“Our latest n-day exploit reporting shows that in an attack on Mongolian government websites, Russian-backed APT29 is suspected of using the same exploits as Intellexa and NSO” — https://blog.google/...
-
@zackwhittaker@mastodon.social
Zack Whittaker
on mastodon
New, by me: Google's Threat Analysis Group found evidence that a group of Russian government hackers, aka APT29, are using exploits that are “identical or strikingly similar” to those previously made by spyware makers Intellexa and NSO Group. …
-
@lorenzofb
Lorenzo Franceschi-Bicchierai
on x
NEW: Google found evidence that a group of Russian government hackers, aka APT29, are using exploits that are “identical or strikingly similar” to those previously made by spyware makers Intellexa and NSO Group. https://techcrunch.com/...
-
@danwblack
Dan Black
on x
Important report highlighting the SVR's wider enablers: “In each iteration of the watering hole campaigns, [APT29] used exploits that were identical or strikingly similar to exploits previously used by commercial surveillance vendors Intellexa and NSO Group.”
-
@charley_snyder_
Charley Snyder
on x
Noteworthy new research here on APT29 use of old NSO and Intellexa exploits. In my opinion, this is yet more evidence that the proliferation of commercial hacking capabilities — sometimes into the hands of apex teams like APT29 — poses a serious threat to the web.
-
@arawnsley
Adam Rawnsley
on x
“In each iteration of the watering hole campaigns, the attackers used exploits that were identical or strikingly similar to exploits previously used by commercial surveillance vendors (CSVs) Intellexa and NSO Group.” https://blog.google/...
-
@bushidotoken
Will
on x
Latest 🇷🇺 APT29 (Cozy Bear, Midnight Blizzard) activity below 👇
-
@billyleonard
Billy Leonard
on x
🆕🚨 New analysis from @Google TAG on suspected APT29 waterholes against 🇲🇳 gov. n-day exploits targeting iOS and Android we first observed in use from commercial surveillance vendors🫢 more details in the blog! awesome work from @_clem1 and team🤝 https://blog.google/...