top of page

Knotweed, the information research organisation infecting the UK with spyware

Microsoft attributes the threat group Knotweed's activities to a professional spyware vendor named DSIRF, who is classified as a private sector offensive actor (PSOA) and is currently employing the commercialised cyberweapon Subzero against their targets.

Microsoft has been following the activities of a threat group known as Knotweed who they have successfully attributed to DSIRF. DSIRF are an Austrian spyware vendor that offer surveillance and intrusion capabilities to organisations willing to use less than ethical tactics.

These services are advertised by the company as information research and digital forensics.

The group have been targeting law firms, banks, and strategic consultancies in the UK as well as Austria and Panama.

Many of the targets are related in some form to the customers of DSIRF that have purchased their services as well as command and control domains related to the actor’s malware activity being owned by DSIRF which helped with attributing Knotweed attacks to DSIRF.

Law firms are being targeted more often in general by threat actors, likely due to the wide variety of targets that threat actors can pivot towards afterwards, and also because of the sensitive information stored during legal disputes.

The most recent attacks by Knotweed have seen exploitation of CVE-2022-22047 - a patch for this vulnerability was released in last month’s publication of Microsoft’s patch on July 12.

Exploitation of this vulnerability may allow Knotweed and other threat actors to gain System level privileges. Furthermore, the attacks are very sophisticated, and the actors go to extensive lengths to evade detection.

This is accomplished through intensive obfuscation of the malware loader which will download the malware into the system’s memory to avoid antivirus that scans files on disk.

Knotweed were investigated by Microsoft due to their development and deployment of the ‘Subzero’ malware which is used to exfiltrate information from victim computers as well phones and other devices connected to the internet.

Subzero is advertised by the organisation on their website as a “state of the art computer surveillance tool”. This tool, and the others in use by either this actor or the many other highly skilled groups, are powerful enough to cause serious concern for the security of their targets and any subsequent victims.

Knotweed has recently been observed using Adobe Reader in combination with zero-day vulnerabilities to infect targets and move through networks to achieve their objectives and the group is not alone in taking advantage of patch delays.

This is an example of a threat actor targeting organisations likely to act as a supply chain to a more promising victim whilst still providing a monetary opportunity.

It is advised that organisations assess which organisations they are connected to that would offer similar risks and identify ways to mitigate this.



Report all Fraud and Cybercrime to Action Fraud by calling 0300 123 2040 or online. Forward suspicious emails to Report SMS scams by forwarding the original message to 7726 (spells SPAM on the keypad).



The contents of blog posts on this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of East Midlands Cyber Resilience Centre (EMCRC) is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others. Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. EMCRC provides affordable services and Trusted Partners if you need specific support. For specific questions please contact us by email.


EMCRC does not accept any responsibility for any loss which may arise from reliance on information or materials published on this blog. EMCRC is not responsible for the content of external internet sites that link to this site or which are linked from it.

bottom of page