Skip to content

Russian State Hackers Exposed Using Commercial Spyware Tactics

APT29, a Russian state-backed group, is caught using tactics from commercial spyware vendors. These attacks highlight the evolving cyber threat landscape and the need for international cooperation.

In this image, we can see an advertisement contains robots and some text.
In this image, we can see an advertisement contains robots and some text.

Russian State Hackers Exposed Using Commercial Spyware Tactics

Russian state-sponsored hackers, known as APT29 or Cozy Bear, have been exposed using commercial spyware vendors' tactics in a series of attacks on Mongolian government websites. This is a rare instance of a state-backed group reusing techniques from private spyware companies.

The first campaign, targeting iOS users, exploited an iOS WebKit vulnerability (CVE-2023-41993) to steal Safari user account cookies. The hackers also exploited vulnerabilities in Apple's Safari browser and Google Chrome on Android to distribute malware. Google Threat Analysis Group assessed these campaigns with moderate confidence to be conducted by APT29.

The exploits used in these campaigns were previously employed by commercial spyware vendors NSO Group and Intellexa. The second campaign, targeting Android users, used a Chrome exploit chain (CVE-2024-5274 and CVE-2024-4671) against unpatched devices. These attacks occurred between November 2023 and July 2024, compromising cabinet.gov[.]mn and mfa.gov[.]mn websites.

Google TAG notified the relevant parties, including Apple, Alphabet's Android and Google Chrome units, and the Mongolian CERT about the campaigns. The use of commercial spyware vendors' tactics by a state-sponsored group highlights the evolving nature of cyber threats and the importance of international cooperation in cybersecurity.

Read also:

Latest