Categories: Technology

Russian government hackers found using exploits made by spyware companies NSO and Intellexa

Google says it has evidence that Russian government hackers are using exploits that are “identical or strikingly similar” to those previously made by spyware makers Intellexa and NSO Group.

In a blog post on Thursday, Google said it is not sure how the Russian government acquired the exploits, but said this is an example of how exploits developed by spyware makers can end up in the hands of “dangerous threat actors.”

In this case, Google says the threat actors are APT29, a group of hackers widely attributed to Russia’s Foreign Intelligence Service, or the SVR. APT29 is a highly capable group of hackers, known for its long-running and persistent campaigns aimed at conducting espionage and data theft against a range of targets, including tech giants Microsoft and SolarWinds, as well as foreign governments.

Google said it found the hidden exploit code embedded on Mongolian government websites between November 2023 and July 2024. During this time, anyone who visited these sites using an iPhone or Android device could have had their phone hacked and data stolen, including passwords, in what is known as a “watering hole” attack.

The exploits took advantage of vulnerabilities in the iPhone’s Safari browser and Google Chrome on Android that had already been fixed at the time of the suspected Russian campaign. Still, those exploits nevertheless could be effective in compromising unpatched devices.

According to the blog post, the exploit targeting iPhones and iPads was designed to steal user account cookies stored in Safari specifically across a range of online email providers that host the personal and work accounts of the Mongolian government. The attackers could use the stolen cookies to then access those government accounts. Google said the campaign aimed at targeting Android devices used two separate exploits together to steal user cookies stored in the Chrome browser.

Google security researcher Clement Lecigne, who authored the blog post, told TechCrunch that it is not known for certain who the Russian government hackers were targeting in this campaign. “But based on where the exploit was hosted and who would normally visit these sites, we believe that Mongolian government employees were a likely target,” he said.

Lecigne, who works for Google’s Threat Analysis Group, the security research unit that investigates government-backed cyber threats, said Google is linking the reuse of the code to Russia because the researchers previously observed the same cookie-stealing code used by APT29 during an earlier campaign in 2021.

A far view of the Russian Foreign Intelligence Service (SVR) headquarters outside Moscow taken on June 29, 2010.
Image Credits: Alexey Sazonov/AFP (opens in a new window) / Getty Images

A key question remains: How did the Russian government hackers obtain the exploit code to begin with? Google said both iterations of the watering hole campaign targeting the Mongolian government used code resembling or matching exploits from Intellexa and NSO Group. These two companies are known for developing exploits capable of delivering spyware that can compromise fully patched iPhones and Android phones.

Google said the exploit code used in the watering hole attack targeting Chrome users on Android shared a “very similar trigger” with an exploit developed earlier by NSO Group. In the case of the exploit targeting iPhones and iPads, Google said the code used the “exact same trigger as the exploit used by Intellexa,” which Google said strongly suggested that the exploit authors or providers “are the same.”

When asked by TechCrunch about the reuse of exploit code, Lecigne said: “We do not believe the actor recreated the exploit,” ruling out the likelihood that the exploit was independently discovered by the Russian hackers. 

“There are multiple possibilities as to how they could have acquired the same exploit, including purchasing it after it was patched or stealing a copy of the exploit from another customer,” said Lecigne.

NSO Group did not respond to TechCrunch’s inquiry prior to publication. In a statement provided after publication, NSO spokesperson Gil Lainer said: “NSO does not sell its products to Russia. Our technologies are sold exclusively to vetted U.S. & Israel-allied intelligence and law enforcement agencies. Our systems and technologies are highly secure and are continuously monitored to detect and neutralize external threats.”

TechCrunch contacted the Russian Embassy in Washington, DC and Mongolia’s Permanent Mission to the United Nations in New York for comment, but did not hear back by press time. Intellexa could not be reached for comment. Apple spokesperson Shane Bauer did not respond to a request for comment.

Google said users should “apply patches quickly” and keep software up-to-date to help prevent malicious cyberattacks. According to Lecigne, iPhone and iPad users with the high-security feature Lockdown Mode switched on were not affected even when running a vulnerable software version.

Updated with post-publish response from NSO.

News Today

Recent Posts

Poco India head Himanshu Tandon talks about Poco Pad 5G, upcoming launches, HyperOS on tablets and more

Also Read | Poco Pad 5G review: Budget-friendly 5G tablet for everyday use Soon after…

18 seconds ago

Carly Gregg mental health questioned, conflicting testimonies in trial

2024-09-20 05:15:02 Rebuttal witnesses for the state testified Thursday that a Rankin County teenage girl…

10 mins ago

Mortgage Rates Continue to Fall, Driving Activity for Purchases, Refinances — RISMedia

2024-09-20 05:05:03 More signs point to more favorable housing costs this week as average mortgage…

20 mins ago

Billie Jean King set to earn another honor with the Congressional Gold Medal

From left, Naila-Jean Meyers, of the Minnesota Star Tribune and Sally Jenkins, of The Washington…

25 mins ago

Metallica Announce 2025 North American M72 World Tour Dates – Knotfest

2024-09-20 04:55:02 Metallica has confirmed the extension of their record-breaking M72 World Tour with the…

30 mins ago

METALLICA Announces Dates For ‘M72 WORLD TOUR 2025’

2024-09-20 04:45:04 Metallica has confirmed that its record-breaking M72 World Tour will be extended into…

40 mins ago