City
Epaper

Microsoft catches spyware group targeting customers using Windows bugs

By IANS | Updated: July 28, 2022 10:50 IST

New Delhi, July 28 Microsoft has caught an Austrian company selling spyware based on multiple Windows and Adobe ...

Open in App

New Delhi, July 28 Microsoft has caught an Austrian company selling spyware based on multiple Windows and Adobe zero-day exploits to attack its customers.

The Microsoft Threat Intelligence Center (MSTIC) and the Microsoft Security Response Center (MSRC) found that the spyware developer officially named DSIRF and codenamed KNOTWEED developed a spyware called 'Subzero' that was used to target law firms, banks, and consultancy firms in the UK, Austria and Panama.

"It's important to note that the identification of targets in a country doesn't necessarily mean that a DSIRF customer resides in the same country, as international targeting is common," the company said in a blogpost late on Wednesday.

MSTIC has found multiple links between DSIRF and the exploits and malware used in these attacks.

These include command-and-control infrastructure used by the malware directly linking to DSIRF, a DSIRF-associated GitHub account being used in one attack, a code signing certificate issued to DSIRF being used to sign an exploit, and other open-source news reports attributing Subzero to DSIRF.

Such cyber mercenaries sell hacking tools or services through a variety of business models.

Two common models for this type of actor are access-as-a-service and hack-for-hire.

In access-as-a-service, the actor sells full end-to-end hacking tools that can be used by the purchaser in operations, with the private-sector offensive actor (PSOA) not involved in any targeting or running of the operation.

In hack-for-hire, detailed information is provided by the purchaser to the actor, who then runs the targeted operations.

Microsoft said that KNOTWEED may blend these models: they sell the Subzero malware to third parties but have also been observed using KNOTWEED-associated infrastructure in some attacks, suggesting more direct involvement.

"Customers are encouraged to expedite deployment of the July 2022 Microsoft security updates to protect their systems against exploits," the company advised.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Tags: Microsoft threat intelligence centermicrosoftukNew DelhiThe new delhi municipal councilDelhi south-west
Open in App

Related Stories

InternationalUS Government Shutdown: US Embassy in India’s X Account to Pause Regular Updates Until Full Operations Resume

CricketIND-W vs AUS-W, 3rd ODI: Australia Women Win Toss, Opt to Bat Against India in Series Decider; Check Playing XIs

CricketWhy Is India Women’s Cricket Team Wearing a Pink Jersey in IND-W vs AUS-W 3rd ODI 2025 Match?

CricketIND-W vs AUS-W 3rd ODI LIVE Cricket Streaming: When and Where to Watch India Women vs Australia Women Final Match

LifestyleGanpati Visarjan in London: Videos Show Indians Taking Out Ganesh Idol Immersion Procession With Band

Technology Realted Stories

TechnologyRBI eases forex norms to help exporters amid global uncertainties

TechnologyMPC decisions to further increase credit flow, promote inclusive growth: Bankers

TechnologyIndian job market witnesses 10 per cent growth in September: Report

TechnologyYoung night shift workers more at risk of developing kidney stones: Study

TechnologyRBI slashes inflation forecast to 2.6 pc in FY26 over GST reforms, benign food prices