c.im is one of the many independent Mastodon servers you can use to participate in the fediverse.
C.IM is a general, mainly English-speaking Mastodon instance.

Server stats:

2.8K
active users

Chuck Darwin

Russian government hackers are using exploits that are “identical or strikingly similar” to those previously made by spyware makers Intellexa and NSO Group.

In a blog post on Thursday, Google said it is not sure how the Russian government acquired the exploits,
but said this is an example of how exploits developed by spyware makers can end up in the hands of
“dangerous threat actors.”

In this case, Google says the threat actors are , a group of hackers widely attributed to Russia’s Foreign Intelligence Service, or the .

APT29 is a highly capable group of hackers,
known for its long-running and persistent campaigns aimed at conducting espionage and data theft against a range of targets,
including tech giants Microsoft and SolarWinds, as well as foreign governments.

Google said it found the hidden exploit code embedded on Mongolian government websites between November 2023 and July 2024.

During this time, anyone who visited these sites using an iPhone or Android device could have had their phone hacked and data stolen, including passwords, in what is known as a “watering hole” attack.

techcrunch.com/2024/08/29/russ

TechCrunch · Russian government hackers found using exploits made by spyware companies NSO and Intellexa | TechCrunchGoogle said the findings were an example of how exploits developed by spyware makers can end up in the hands of "dangerous threat actors."