Russian government hackers found using exploits made by spyware companies NSO and Intellexa

Date:

Share post:


Google says it has evidence that Russian government hackers are using exploits that are “identical or strikingly similar” to those previously made by spyware makers Intellexa and NSO Group.

In a blog post on Thursday, Google said it is not sure how the Russian government acquired the exploits, but said this is an example of how exploits developed by spyware makers can end up in the hands of “dangerous threat actors.”

In this case, Google says the threat actors are APT29, a group of hackers widely attributed to Russia’s Foreign Intelligence Service, or the SVR. APT29 is a highly capable group of hackers, known for its long-running and persistent campaigns aimed at conducting espionage and data theft against a range of targets, including tech giants Microsoft and SolarWinds, as well as foreign governments.

Google said it found the hidden exploit code embedded on Mongolian government websites between November 2023 and July 2024. During this time, anyone who visited these sites using an iPhone or Android device could have had their phone hacked and data stolen, including passwords, in what is known as a “watering hole” attack.

The exploits took advantage of vulnerabilities in the iPhone’s Safari browser and Google Chrome on Android that had already been fixed at the time of the suspected Russian campaign. Still, those exploits nevertheless could be effective in compromising unpatched devices.

According to the blog post, the exploit targeting iPhones and iPads was designed to steal user account cookies stored in Safari specifically across a range of online email providers that host the personal and work accounts of the Mongolian government. The attackers could use the stolen cookies to then access those government accounts. Google said the campaign aimed at targeting Android devices used two separate exploits together to steal user cookies stored in the Chrome browser.

Google security researcher Clement Lecigne, who authored the blog post, told TechCrunch that it is not known for certain who the Russian government hackers were targeting in this campaign. “But based on where the exploit was hosted and who would normally visit these sites, we believe that Mongolian government employees were a likely target,” he said.

Lecigne, who works for Google’s Threat Analysis Group, the security research unit that investigates government-backed cyber threats, said Google is linking the reuse of the code to Russia because the researchers previously observed the same cookie-stealing code used by APT29 during an earlier campaign in 2021.

A far view of the Russian Foreign Intelligence Service (SVR) headquarters outside Moscow taken on June 29, 2010. Image Credits: Alexey Sazonov / AFP / Getty Images
Image Credits: Alexey Sazonov (opens in a new window) / Getty Images

A key question remains: How did the Russian government hackers obtain the exploit code to begin with? Google said both iterations of the watering hole campaign targeting the Mongolian government used code resembling or matching exploits from Intellexa and NSO Group. These two companies are known for developing exploits capable of delivering spyware that can compromise fully-patched iPhones and Android phones.

Google said the exploit code used in the watering hole attack targeting Chrome users on Android shared a “very similar trigger” with an exploit developed earlier by NSO Group. In the case of the exploit targeting iPhones and iPads, Google said the code used the “exact same trigger as the exploit used by Intellexa,” which Google said strongly suggested that the exploit authors or providers “are the same.”

When asked by TechCrunch about the reuse of exploit code, Lecigne said: “We do not believe the actor recreated the exploit,” ruling out the likelihood that the exploit was independently discovered by the Russian hackers. 

“There are multiple possibilities as to how they could have acquired the same exploit, including purchasing it after it was patched or stealing a copy of the exploit from another customer,” said Lecigne.

Google said users should “apply patches quickly” and keep software up-to-date to help prevent malicious cyberattacks. According to Lecigne, iPhone and iPad users with the high-security feature Lockdown Mode switched on were not affected even when running a vulnerable software version.

TechCrunch contacted the Russian Embassy in Washington DC and Mongolia’s Permanent Mission to the United Nations in New York for comment, but did not hear back by press time. Intellexa could not be reached for comment, and NSO Group did not return a request for comment. Apple spokesperson Shane Bauer did not respond to a request for comment.



Source link

Lisa Holden
Lisa Holden
Lisa Holden is a news writer for LinkDaddy News. She writes health, sport, tech, and more. Some of her favorite topics include the latest trends in fitness and wellness, the best ways to use technology to improve your life, and the latest developments in medical research.

Recent posts

Related articles

Quilt, Furno Materials, and RA Capital Management share the stage at TechCrunch Disrupt 2024

Launching a new product is challenging, but doing it in a space dominated by tech giants requires...

Announcing our next wave of Startup Battlefield judges at TechCrunch Disrupt 2024

Startup Battlefield 200 is a major highlight at every Disrupt, and we’re thrilled to find out which...

Amazon debuts an AI assistant for sellers, Project Amelia

Amazon sellers now have access to an AI assistant designed to help them grow their business by...

Karman Industries hopes its SpaceX-inspired heat pumps will replace industrial boilers

Industrial heat, which is used by companies as diverse as breweries and food processors to chemical manufacturers...

Brightband sees a bright (and open-source) future for AI-powered weather forecasting

With an explosion of weather and climate data that the last generation of tools can’t handle, is...

Phlair’s carbon sucking technology could lower direct air capture’s costs

When it comes to climate change, there’s no such thing as a “get out of jail free”...

India weighs easing market share limits for UPI payment operators

The governing body overseeing India’s popular UPI payments rail is considering easing its proposed market share cap...

Palmer Luckey returns to headsets as Anduril partners with Microsoft on U.S. military tech

Palmer Luckey, the Hawaiian-shirt wearing founder who sold Oculus VR for $2 billion before co-founding the military...