Hackers linked to Russian government found using some very familiar malware tools

0
12

Research from Google’s Threat Analysis Group (TAG) has found evidence Russian-backed threat actor APT29 used iterations of watering hole campaigns which were ‘identical or strikingly similar’ to exploits developed by notorious spyware companies NSO Group and Intellexa.

TAG found Mongolian government websites were hit by multiple campaigns earlier in 2024 after discovering hidden exploit codes embedded in the sites. The exploits meant anyone who used the sites using an iPhone or Android device may have had their phone hacked and data stolen.

LEAVE A REPLY

Please enter your comment!
Please enter your name here