Topics

Latest

AI

Amazon

Article image

Image Credits:Bryce Durbin / TechCrunch

Apps

Biotech & Health

mood

phone encryption on a dark background, with glyphs on the screen in red

Image Credits:Bryce Durbin / TechCrunch

Cloud Computing

commercialism

Crypto

A distant view of Russia’s foreign intelligence service compound.

A far view of the Russian Foreign Intelligence Service (SVR) headquarters outside Moscow taken on June 29, 2010.Image Credits:Alexey Sazonov/AFP(opens in a new window)/ Getty Images

endeavor

EVs

Fintech

fund raise

Gadgets

Gaming

Google

Government & Policy

Hardware

Instagram

Layoffs

Media & Entertainment

Meta

Microsoft

Privacy

Robotics

security measure

societal

Space

inauguration

TikTok

transport

Venture

More from TechCrunch

Events

Startup Battlefield

StrictlyVC

Podcasts

Videos

Partner Content

TechCrunch Brand Studio

Crunchboard

Contact Us

Google says it has evidence that Russian government hackers are using feat that are “ identical or strikingly similar ” to those previously made by spyware makers Intellexa and NSO Group .

Ina blog post on Thursday , Google said it is not certain how the Russian government acquired the effort , but tell this is an example of how exploits develop by spyware God Almighty can end up in the hands of “ severe terror histrion . ”

In this case , Google articulate the terror actors are APT29 , a group of drudge wide attributed to Russia ’s Foreign Intelligence Service , or the SVR . APT29 is a extremely capable group of hackers , known for itslong - running and dour campaignsaimed atconducting espionageanddata theftagainst a image of fair game , including technical school giants Microsoft and SolarWinds , as well as foreign governments .

Google say it found the hidden exploit code embed on Mongol government websites between November 2023 and July 2024 . During this fourth dimension , anyone who visited these land site using an iPhone or Android gimmick could have had their earphone hacked and data steal , include passwords , in what is known as a “ watering hole ” attack .

The feat took reward of vulnerabilities in the iPhone ’s Safari web browser and Google Chrome on Android that had already been desex at the time of the suspected Russian campaign . Still , those feat nevertheless could be in force in compromising unpatched devices .

According to the web log Charles William Post , the exploit targeting iPhones and iPads was designed to steal user accounting cookies stored in Safari specifically across a mountain chain of online email provider that host the personal and piece of work accounts of the Mongolian government . The attackers could use the steal cookie to then access those government account . Google said the campaign aim at targeting Android devices used two separate exploit together to steal user cookie stored in the Chrome browser app .

Google security researcher Clement Lecigne , who authored the web log billet , told TechCrunch that it is not known for sure who the Russian government hacker were targeting in this military campaign . “ But base on where the feat was host and who would unremarkably visit these land site , we believe that Mongolian regime employees were a likely target , ” he say .

Lecigne , who works for Google ’s Threat Analysis Group , the security research building block that enquire government - backed cyber threats , said Google is associate the reuse of the code to Russia because the researchers previously note the same cooky - stealing code used by APT29during an earlier campaign in 2021 .

A fundamental question remain : How did the Russian political science drudge obtain the exploit code to get down with ? Google aver both iterations of the watering pickle campaign targeting the Mongolian governance used code resemble or matching exploits from Intellexa and NSO Group . These two companies are do it fordeveloping exploits capable of delivering spywarethat can compromise fully patch iPhones and Android earpiece .

Google said the exploit code used in the watering kettle of fish attack targeting Chrome users on Android apportion a “ very similar trigger ” with an effort develop to begin with by NSO Group . In the case of the feat point iPhones and iPads , Google said the code used the “ exact same induction as the feat used by Intellexa , ” which Google said strongly propose that the exploit authors or provider “ are the same . ”

When asked by TechCrunch about the reuse of exploit code , Lecigne said : “ We do not believe the actor recreate the exploit , ” ruling out the likelihood that the feat was independently discovered by the Russian cyber-terrorist .

“ There are multiple possibilities as to how they could have get the same feat , admit purchase it after it was patched or slip a copy of the exploit from another customer , ” said Lecigne .

NSO Group did not reply to TechCrunch ’s research prior to publication . In a assertion provided after publication , NSO interpreter Gil Lainer enounce : “ NSO does not sell its products to Russia . Our engineering are sell exclusively to vet U.S. & Israel - ally intelligence and law enforcement agencies . Our organization and technologies are extremely unattackable and are continuously monitored to discover and neutralize external threats . ”

TechCrunch get through the Russian Embassy in Washington , DC and Mongolia ’s Permanent Mission to the United Nations in New York for comment , but did not find out back by pressing time . Intellexa could not be reached for gossip . Apple spokesperson Shane Bauer did not respond to a request for comment .

Google said users should “ apply patches speedily ” and keep software up - to - date to help forestall malicious cyberattacks . According to Lecigne , iPhone and iPad userswith the gamey - security feature Lockdown Mode switched onwere not affected even when pass a vulnerable computer software adaptation .

update with post - publish reply from NSO .