Hackers linked to the Russian government are found to be using some well-known malware tools

An investigation by Google’s Threat Analysis Group (TAG) found evidence that Russian-backed threat actor APT29 used iterations of watering hole campaigns that were “identical or strikingly similar” to exploits developed by notorious spyware firms NSO Group and Intellexa.

TAG discovered that Mongolian government websites had been targeted by multiple campaigns in early 2024 after discovering hidden exploit code embedded in the sites. The exploits meant that anyone using the sites with an iPhone or Android device could have had their phone hacked and data stolen.

© 2024 Telegraph247. All rights reserved.
Designed and developed by Telegraph247
scroll to top