HomeCII/OTCommercial Spyware Vendors Found to Have a Copycat in Leading Russian APT

Commercial Spyware Vendors Found to Have a Copycat in Leading Russian APT

Published on

spot_img

Recently, multiple exploit campaigns have been linked to a Russian-backed threat actor known as APT29, Cozy Bear, and Midnight Blizzard. These campaigns have been discovered delivering n-day mobile exploits that were previously used by commercial spyware vendors, raising concerns about the security and privacy of users.

According to Google’s Threat Analysis Group (TAG), these exploit campaigns were launched through a watering hole attack on Mongolian government websites. The exploits used in these campaigns are identical to those previously utilized by commercial surveillance vendors Intellexa and NSO Group, indicating a potential connection between the threat actor and these vendors.

The threat actors infected two websites belonging to Mongolia’s Cabinet and Ministry of Foreign Affairs, cabinet.gov[.]mn and mfa.gov[.]mn, in the watering-hole attacks. By injecting malicious code to exploit known vulnerabilities in iOS and Chrome on Android, the attackers aimed to hijack the devices of visitors to these websites.

These campaigns have emerged on three separate occasions, with the most recent one occurring just a month ago. Two of the campaigns delivered an iOS exploit through a vulnerability known as CVE-2023-41993, which had been recently patched but not before being exploited by Intellexa and NSO Group.

The researchers at Google TAG emphasized that they do not know how the attackers acquired these exploits, but it is clear that APT actors are leveraging n-day exploits that were originally used as 0-days by commercial surveillance vendors. Despite similarities in exploit usage, the recent watering hole campaigns differed in their delivery methods and second-stage objectives.

Although there are still unanswered questions about the source of these exploits, this incident underscores the growing threat posed by exploits developed by the commercial surveillance industry. As threat actors continue to utilize these exploits, it becomes increasingly challenging to defend against sophisticated cyber threats.

In conclusion, the discovery of exploit campaigns linked to a Russian-backed threat actor highlights the evolving landscape of cyber threats and the need for robust cybersecurity measures to protect against such attacks. It also raises questions about the relationship between threat actors and commercial surveillance vendors, emphasizing the importance of collaboration between security researchers, vendors, and government agencies to address these complex cybersecurity challenges.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...