Hackers linked to Russian government found using some very familiar malware tools

Estimated read time 2 min read



Research from Google’s Threat Analysis Group (TAG) has found evidence Russian-backed threat actor APT29 used iterations of watering hole campaigns which were ‘identical or strikingly similar’ to exploits developed by notorious spyware companies NSO Group and Intellexa.

TAG found Mongolian government websites were hit by multiple campaigns earlier in 2024 after discovering hidden exploit codes embedded in the sites. The exploits meant anyone who used the sites using an iPhone or Android device may have had their phone hacked and data stolen.



Source link

You May Also Like

More From Author

+ There are no comments

Add yours