Russian Hackers Exploit Spyware Tools from NSO and Intellexa
Google's Threat Analysis Group reveals APT29's use of commercial spyware exploits in attacks on Mongolian government websites.
- APT29, a Russian state-backed group, used exploits similar to those from NSO Group and Intellexa.
- The attacks targeted unpatched iOS and Android devices through watering hole tactics.
- Compromised websites included Mongolia's Cabinet and Ministry of Foreign Affairs.
- Exploits were initially developed for commercial spyware but later used by APT29.
- Google urges users to keep software updated to mitigate such threats.