Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities

Throwback Attack: Russian APT group Turla has hit 45 countries since 2004

  • Christina Miller
  • April 22, 2022
Back door to a building.
Courtesy: Brett Sayles
Total
0
Shares
0
0
0
0

Since Russia made its initial incursion into Ukraine, the world has been wondering where the superpower will strike next. However, the next strike likely won’t be a physical attack, but rather will occur in the cyber landscape. U.S. officials have warned about potential Russian cyber threats on critical infrastructure, and based off the long history of Russian-based threat groups, that concern is valid. It isn’t a question of if they will attack; it is more about when.

A well-known Russian-based threat group is Turla. The group has infected more than 45 countries since 2004, encompassing numerous industry types, such as governments, embassies, military, education, research and pharmaceutical companies. Their latest attack on Germany, the U.S. and Afghanistan wasn’t that long ago either.

Turla’s history

Turla is known for attacking with watering hole and spear phishing campaigns and using in-house tools and malware. Their espionage platform is mainly deployed against Windows systems but was also effective against macOS and Linux machines in 2014. Turla’s activity heightened in mid-2015, but the group has been around since 2004. The goal of their attacks is to siphon data from local computers to other servers. Turla also has been known by other names, including Snake, Uroburos, Krypton, Venomous Bear and more.

Early reports about Snake compared it to Stuxnet, the worm that attacked Iran’s nuclear program, but the inner workings of Snake were found to be quite different. Snake is not as powerful as Stuxnet yet, and there isn’t evidence that Snake would be capable of taking over computer controllers that run nuclear centrifuges. However, when Snake first appeared, many wondered whether there was another purpose for it other than just espionage. Could there be more going on that people weren’t seeing?

“The usual Russian approach would be to design something that could both conduct surveillance and aid in an attack,” said a senior intelligence official in the New York Times, who was describing how the National Security Agency and the Pentagon’s Cyber Command were on the lookout for the kind of computer attacks that were unleashed on Estonia several years ago.

Another one of Turla’s big campaigns was Epic Turla, where they launched a multistage attack, starting with spear phishing emails with Adobe PDF exploits and watering hole attacks to infect users. The Epic Turla attackers were extremely dynamic, using many different methods depending on what was available at the time. As the group started gaining confidence, they upgraded to using backdoors alongside each attack. Then, once the victims’ systems were infiltrated, the attackers would deploy the rootkit and other mechanisms. Links to the Moonlight Maze backdoors have been found with Turla, as well, which means the group was able to use leftover backdoors from a previous attack in the 1990s and upgrade them enough to be useful in more recent exploits.

The backdoor attacks

The Epic Turla attack was not the last time Turla used backdoors as a way to infiltrate systems. The attack in September 2021 on the U.S., Germany and Afghanistan was also through backdoors. Turla developed a new, sophisticated technique called TinyTurla. The TinyTurla malware is a backdoor that allows attackers to maintain access to the victim’s system even if the attacker’s other malware is discovered and removed. This backdoor can also act as a second-stage dropper to input more malware on the same system and can launch subprocesses and export data from devices. Its limited functionality and simple coding, which has been used since 2020, makes it difficult to detect as malware.

Cisco Talos Intelligence Group stated that the Turla hacking group started targeting Afghanistan before the U.S. and other Western military forces left the country and the Taliban took control of the government. It was likely these hacking groups were using the backdoor malware in an attempt to compromise the information technology systems of the previous government in Afghanistan due to the turmoil surrounding the shifting power.

A sample of the backdoor malware collected by the Cisco team demonstrated that it comes in the form of a .DLL and is installed as a service on a Windows device. The file name was listed as w64time.dll because there was another legitimate version of the malware dubbed w32time.dll.

Once the backdoor was installed on the victim’s device, it was linked back to the command-and-control (C2) server run and operated by the Turla hacking group. The backdoor then linked up to the system using an encrypted HTTPS channel after every five seconds and checked if there were any newly launched commands or instructions.

“One public reason why we attributed this backdoor to Turla is the fact that they used the same infrastructure as they used for other attacks that have been attributed to their Penguin Turla Infrastructure,” the researchers stated.

Lessons from Turla

APT groups continually come up with new ways to infect their victims while remaining relatively invisible on their systems. Using a backdoor isn’t anything new; for example, the Equation group has been using them for decades. However, new and old threat actors are finding different ways to exploit this strategy as well as original ways to stay hidden. Cybersecurity experts continue to monitor threat groups, such as Turla, and advise having multi-layered security architecture in place to detect these kinds of attacks

While there is constant speculation all over the world about where the next Russian cyberattack will occur, there may already be one in progress that simply hasn’t been detected yet. The technology and techniques are already out there; it may just be a matter of time until something is found.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Christina Miller

Christina Miller is the assistant content editor at CFE Media and Technology.

Related Topics
  • CFE Content
  • Featured
  • news
Previous Article
Courtesy of CFE Media and Technology
  • Strategies

Cybersecurity tactics to defend your workforce

  • Lance Spitzner
  • April 21, 2022
Read More
Next Article
Courtesy: Brett Sayles
  • Strategies

Lessons learned from ICS cyberattacks and industry surveys

  • Sanjay Chhillar
  • April 23, 2022
Read More
You May Also Like
Courtesy of: CFE Media and Technology
Read More

Throwback attack: The U.S. hits Russia with the first logic bomb attack

Cybersecurity Locks
Read More

Throwback attack: Kevin Poulsen wins a Porsche (and hacks the U.S. government)

Read More

Throwback Attack: Hacker steals source code for Half-Life 2 video game

Courtesy: CFE Media
Read More

Throwback Attack: Petya, the red skull of ransomware

Test 2 Alt Text
Read More

Throwback Attack: ILOVEYOU, a love letter no one wanted

Read More

Throwback Attack: The Morris Worm launches the first major attack on the internet

Image courtesy: Brett Sayles
Read More

Throwback Attack: Teamsters refuse to pay after Labor Day cyberattack

Read More

I’m sorry, we’re closed: Why most ransomware attacks happen out of hours

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT