News

Google Accuses Spanish Company Variston IT of Creating Spyware and Exploiting 0-Day

Google Threat Analysis Group (TAG) accuses the Spanish company Variston IT of developing spyware, as creating spyware and frameworks that exploit already fixed vulnerabilities in Chrome, Firefox and Microsoft Defender.

Let me remind you that we recently reported that Google Sued G Verifier Scammers Who Posed as Company Representatives, and also that Google Claims RCS Lab Hacking Tools Are Being Used to Target iOS and Android Users.

According to the official website, Variston IT positions itself as a provider of customized information security solutions, including for SCADA and IoT integrators, custom patches for proprietary systems, data discovery tools, and also offers security training and develops security protocols for embedded devices.

However, TAG experts write that Variston IT sells another product not mentioned on the site: frameworks that provide the client with everything necessary to install malware on devices of targets that need to be monitored.

Their Heliconia platform exploits n-day vulnerabilities in Chrome, Firefox and Microsoft Defender and provides all the tools needed to deploy payloads to target devices.the TAG report reads.

According to the researchers, the company’s frameworks consist of several components, each of which targets specific vulnerabilities on target devices:

  1. Heliconia Noise: a web framework for exploiting a rendering error in Chrome, then exiting the browser sandbox and installing malware on the target device;
  2. Heliconia Soft: a web framework that deploys a PDF containing an exploit for a vulnerability in Microsoft Defender (CVE-2021-42298);
  3. Heliconia Files: A set of exploits for Firefox for Linux and Windows, one of which is designed to attack the CVE-2022-26485 vulnerability.

Ultimately, Heliconia Noise and Heliconia Soft deploy the “agent_simple” agent on the target system. However, the sample framework studied by Google contained only a dummy agent that started and immediately exited without executing any malicious code. The researchers believe that the users of the framework apply their own agents, or all this is part of another project to which the specialists did not have access.

Google TAG says they found out about Heliconia after receiving anonymous reports through Chrome’s bug reporting program. Experts believe that the company exploited the mentioned problems even before the release of the patches, when the bugs were still zero-day vulnerabilities.

User Review
0 (0 votes)
Comments Rating 0 (0 reviews)
Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Recent Posts

Remove Kurlibat.xyz pop-up ads (Virus Removal Guide)

Kurlibat.xyz is a site that tries to trick you into clik to its browser notifications…

1 day ago

Remove Initiateintenselyrenewedthe-file.top pop-up ads (Virus Removal Guide)

Initiateintenselyrenewedthe-file.top is a domain that tries to trick you into clik to its browser notifications…

1 day ago

Remove Wotigorn.xyz pop-up ads (Virus Removal Guide)

Wotigorn.xyz is a site that tries to force you into subscribing to its browser notifications…

1 day ago

Remove Initiateintenselyprogressivethe-file.top pop-up ads (Virus Removal Guide)

Initiateintenselyprogressivethe-file.top is a domain that tries to force you into clik to its browser notifications…

1 day ago

Remove Nuesobatoxylors.co.in pop-up ads (Virus Removal Guide)

Nuesobatoxylors.co.in is a domain that tries to trick you into subscribing to its browser notifications…

2 days ago

Remove Helistym.xyz pop-up ads (Virus Removal Guide)

Helistym.xyz is a site that tries to force you into clik to its browser notifications…

2 days ago