Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

OpenAI Rolls Out Teen Safety Features Amid Growing Scrutiny

16 September 2025

Charlie Kirk Shooting Suspect Charged as Prosecutor Seeks Death Penalty

16 September 2025

Baby Steps Is a Hiking Game That Trolls ‘Slightly Problematic’ Men

16 September 2025
Facebook X (Twitter) Instagram
Just In
  • OpenAI Rolls Out Teen Safety Features Amid Growing Scrutiny
  • Charlie Kirk Shooting Suspect Charged as Prosecutor Seeks Death Penalty
  • Baby Steps Is a Hiking Game That Trolls ‘Slightly Problematic’ Men
  • A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users
  • Hit Viking Survival Game Valheim Is Finally Coming To PS5 Next Year
  • How to Set Up and Use a Burner Phone
  • Palworld Launches Into 1.0 Next Year
  • Matthew Prince Wants AI Companies to Pay for Their Sins
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » Powerful Spyware Exploits Enable a New String of ‘Watering Hole’ Attacks
News

Powerful Spyware Exploits Enable a New String of ‘Watering Hole’ Attacks

News RoomBy News Room29 August 20243 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

In recent years, elite commercial spyware vendors like Intellexa and NSO Group have developed an array of powerful hacking tools that exploit rare and unpatched “zero-day” software vulnerabilities to compromise victim devices. And increasingly, governments around the world have emerged as the prime customers for these tools, compromising the smartphones of opposition leaders, journalists, activists, lawyers, and others. On Thursday, though, Google’s Threat Analysis Group is publishing findings about a series of recent hacking campaigns—seemingly carried out by Russia’s notorious APT29 Cozy Bear gang—that incorporate exploits very similar to ones developed by Intellexa and NSO Group into ongoing espionage activity.

Between November 2023 and July 2024, the attackers compromised Mongolian government websites and used the access to conduct “watering hole” attacks, in which anyone with a vulnerable device who loads a compromised website gets hacked. The attackers set up the malicious infrastructure to use exploits that “were identical or strikingly similar to exploits previously used by commercial surveillance vendors Intellexa and NSO Group,” Google’s TAG wrote on Thursday. The researchers say they “assess with moderate confidence” that the campaigns were carried out by APT29.

These spyware-esque hacking tools exploited vulnerabilities in Apple’s iOS and Google’s Android that had largely already been patched. Originally, they were deployed by the spyware vendors as unpatched, zero-day exploits, but in this iteration, the suspected Russian hackers were using them to target devices that hadn’t been updated with these fixes.

“While we are uncertain how suspected APT29 actors acquired these exploits, our research underscores the extent to which exploits first developed by the commercial surveillance industry are proliferated to dangerous threat actors,” the TAG researchers wrote. “Moreover, watering hole attacks remain a threat where sophisticated exploits can be utilized to target those that visit sites regularly, including on mobile devices. Watering holes can still be an effective avenue for … mass targeting a population that might still run unpatched browsers.”

It is possible that the hackers purchased and adapted the spyware exploits or that they stole them or acquired them through a leak. It is also possible that the hackers were inspired by commercial exploits and reverse engineered them by examining infected victim devices.

Between November 2023 and February 2024, the hackers used an iOS and Safari exploit that was technically identical to an offering that Intellexa had first debuted a couple of months earlier as an unpatched zero-day in September 2023. In July 2024, the hackers also used a Chrome exploit adapted from an NSO Group tool that first appeared in May 2024. This latter hacking tool was used in combination with an exploit that had strong similarities to one Intellexa debuted back in September 2021.

When attackers exploit vulnerabilities that have already been patched, the activity is known as “n-day exploitation,” because the vulnerability still exists and can be abused in unpatched devices as time passes. The suspected Russian hackers incorporated the commercial spyware adjacent tools, but constructed their overall campaigns—including malware delivery and activity on compromised devices—differently than the typical commercial spyware customer would. This indicates a level of fluency and technical proficiency characteristic of an established and well-resourced state-backed hacking group.

“In each iteration of the watering hole campaigns, the attackers used exploits that were identical or strikingly similar to exploits from [commercial surveillance vendors], Intellexa and NSO Group,” TAG wrote. “We do not know how the attackers acquired these exploits. What is clear is that APT actors are using n-day exploits that were originally used as 0-days by CSVs.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleiPhone 16 Pro Max Leaked Dummy Unit Offers Glimpse at New Desert Titanium Colourway
Next Article The Lord of the Rings: The Rings of Power season 2 review: a vast improvement

Related Articles

News

OpenAI Rolls Out Teen Safety Features Amid Growing Scrutiny

16 September 2025
News

Charlie Kirk Shooting Suspect Charged as Prosecutor Seeks Death Penalty

16 September 2025
News

Baby Steps Is a Hiking Game That Trolls ‘Slightly Problematic’ Men

16 September 2025
News

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users

16 September 2025
News

How to Set Up and Use a Burner Phone

16 September 2025
News

Matthew Prince Wants AI Companies to Pay for Their Sins

16 September 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024105 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

5 laptops to buy instead of the M4 MacBook Pro

17 November 202492 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
News

How to Set Up and Use a Burner Phone

News Room16 September 2025
Gaming

Palworld Launches Into 1.0 Next Year

News Room16 September 2025
News

Matthew Prince Wants AI Companies to Pay for Their Sins

News Room16 September 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025129 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024105 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users

16 September 2025

Hit Viking Survival Game Valheim Is Finally Coming To PS5 Next Year

16 September 2025

How to Set Up and Use a Burner Phone

16 September 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.