Powerful Spyware Exploits Enable a New String of 'Watering Hole' Attacks
Briefly

The sophistication of hacking tools developed by commercial vendors like Intellexa and NSO Group has enabled state-sponsored actors like APT 29 to conduct espionage on political targets.
Google's research indicates that APT 29 has utilized exploits created by commercial spyware firms to launch watering hole attacks against vulnerable devices, highlighting a dangerous proliferation of these tools.
Exploits initially made by commercial surveillance vendors can fall into the hands of malicious state actors, raising concerns about the security implications and the lifecycle of such vulnerabilities.
The findings from Google's Threat Analysis Group reveal a troubling pattern where APT 29, suspected of Russian espionage, has mirrored exploit techniques of elite spyware developers.
Read at WIRED
[
|
]