Spyware Activity Particularly Impactful in July
Recent research suggests that mercenary spyware has been unusually active in their weaponization of common vulnerabilities and exposures. Read the article to gain insight into this trend.
What was notable about spyware activity in July 2022?
In July 2022, spyware activity saw a notable increase following a quieter June. Reports indicated that developers of mercenary spyware were particularly active in exploiting common vulnerabilities and exposures (CVEs). This spike in activity raised questions about whether it was due to other threat actors being less active during the summer months.
What vulnerabilities were exploited for spyware distribution?
During July 2022, several zero-day vulnerabilities were exploited to distribute spyware. Notably, CVE-2022-2294, affecting Google Chrome, was exploited by the Israeli spyware vendor Candiru. Additionally, Microsoft’s CVE-2022-22047 was used by the mercenary group Knotweed to deploy Subzero spyware. These incidents highlighted a concerning trend of spyware developers closely linking their activities with newly disclosed vulnerabilities.
How did the Follina vulnerability impact cybersecurity in July?
The Follina vulnerability, disclosed at the end of May 2022, continued to be a significant concern in July. It allowed threat actors to execute PowerShell commands without user interaction. On July 6, Fortinet researchers reported a phishing campaign that utilized Follina to distribute the Rozena backdoor, enabling attackers to take control of Windows systems. This incident underscored the ongoing exploitation of unpatched vulnerabilities in the cybersecurity landscape.

Spyware Activity Particularly Impactful in July
published by STEELWATER LTD
Our Story
Our expertise spans over 50 years of experience solving diverse business and IT problems for public sector entities. We work with public sector, non-profit, k-12 and postsecondary education to reduce costs, increase productivity and achieve results for your organization.