Security

What a coincidence. Spyware makers, Russia's Cozy Bear seem to share same exploits

Google researchers note similarities, can't find smoking-gun link


Google's Threat Analysis Group (TAG) has spotted an interesting pattern: A Kremlin-linked cyber-espionage crew and commercial spyware makers exploiting specific security vulnerabilities in pretty much the same way.

The TAG team reckon a crew dubbed APT29, said to be directed by the Russian government, infected the websites of Mongolia’s Cabinet and Ministry of Foreign Affairs to exploit known flaws in Apple's iOS and Chrome on Android in order to hijack devices of the sites' visitors. This tactic is known as a watering hole attack, in which a legit site that valuable netizens often visit is compromised so it can be used to in turn compromise those targets.

You may remember APT29, aka Cozy Bear, as the suspected Russian government cyber-spies that plundered US Democratic National Committee servers, and went after European government targets. The same group was behind the SolarWinds supply chain backdoor, and in January 2024 Microsoft admitted the gang had been monitoring its internal emails.

According to the Googlers, the exploit code quietly deployed at the Mongolian watering hole to takeover devices was pretty close to offerings from commercial spyware vendors such as NSO Group and Intellexa. Fancy that.

"In each iteration of the watering hole campaigns, the attackers used exploits that were identical or strikingly similar to exploits previously used by commercial surveillance vendors (CSVs) Intellexa and NSO Group," TAG noted today.

Commercial spyware vendors are controversial and lucrative businesses. They are also increasingly under fire.

Meta is suing NSO Group for compromising WhatsApp users. Apple is also suing, and has essentially labelled NSO's software "mercenary spyware."

In May key workers of Intellexa were placed under US Treasury sanctions after its surveillanceware was, we're told, used to monitor American government officials and journalists. Intellexa was added to Uncle Sam's Entity list of unwelcome companies last year.

Google's threat finders documented the timeline of the Mongolian watering hole attack from November 2023 until it was shut down in recent months. Mongolia’s Cabinet and Foreign Affairs web servers were first infected with malware designed to exploit the recently patched CVE-2023-41993 vulnerability in iOS, a flaw Intellexa exploited in September of that year. Apple had fixed the issue after spotting it in use by commercial spyware maker NSO Group.

Then in May 2024 NSO began exploiting Android's V8 JavaScript engine flaw, which was patched that month. Two months later the APT29 gang were using the same vulnerability to ravage visitors to the Mongolian sites, in conjunction with a Chrome vulnerability fixed the same month by Google.

"While we are uncertain how suspected APT29 actors acquired these exploits, our research underscores the extent to which exploits first developed by the commercial surveillance industry are proliferated to dangerous threat actors," the TAG team concluded.

"Moreover, watering hole attacks remain a threat where sophisticated exploits can be utilized to target those that visit sites regularly, including on mobile devices." ®

Send us news
3 Comments

Proof-of-concept code released for zero-click critical IPv6 Windows hole

If you haven't deployed August's patches, get busy before others do

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Security boom is over, with over a third of CISOs reporting flat or falling budgets

Good news? Security is still getting a growing part of IT budget

Security biz Verkada to pay $3M penalty under deal that also enforces infosec upgrade

Allowed access to 150K cameras, some in sensitive spots, but has been done for spamming

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

White House thinks it's time to fix the insecure glue of the internet: Yup, BGP

Better late than never

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

CrowdStrike's meltdown didn't dent its market dominance … yet

Total revenue for Q2 grew 32 percent

Microsoft security tools questioned for treating employees as threats

Cracked Labs examines how workplace surveillance turns workers into suspects

Watchdog warns FBI is sloppy on secure data storage and destruction

National security data up for grabs, Office of the Inspector General finds