By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Russia-Linked Turla Exploits Pakistani Hackers’ Servers to Target Afghan and Indian Entities
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Russia-Linked Turla Exploits Pakistani Hackers’ Servers to Target Afghan and Indian Entities
Tech News

Russia-Linked Turla Exploits Pakistani Hackers’ Servers to Target Afghan and Indian Entities

By Viral Trending Content 6 Min Read
Share
SHARE
Turla Exploits Pakistani Hackers

The Russia-linked advanced persistent threat (APT) group known as Turla has been linked to a previously undocumented campaign that involved infiltrating the command-and-control (C2) servers of a Pakistan-based hacking group named Storm-0156 to conduct its own operations since 2022.

The activity, first observed in December 2022, is the latest instance of the nation-state adversary “embedding themselves” in another group’s malicious operations to further their own objectives and cloud attribution efforts, Lumen Technologies Black Lotus Labs said.

“In December 2022, Secret Blizzard initially gained access to a Storm-0156 C2 server and by mid-2023 had expanded their control to a number of C2s associated with the Storm-0156 actor,” the company said in a report shared with The Hacker News.

By leveraging their access to these servers, Turla has been found to take advantage of the intrusions already orchestrated by Storm-0156 to deploy custom malware families referred to as TwoDash and Statuezy in a select number of networks related to various Afghan government entities. TwoDash is a bespoke downloader, whereas Statuezy is a trojan that monitors and logs data saved to the Windows clipboard.

The Microsoft Threat Intelligence team, which has also released its findings into the campaign, said Turla has put to use infrastructure tied to Storm-0156, which overlaps with activity clusters tracked as SideCopy and Transparent Tribe.

Cybersecurity

“Secret Blizzard command-and-control (C2) traffic emanated from Storm-0156 infrastructure, including infrastructure used by Storm-0156 to collate exfiltrated data from campaigns in Afghanistan and India,” Microsoft said in a coordinated report shared with the publication.

Turla, also known by the names Blue Python, Iron Hunter, Pensive Ursa, Secret Blizzard (formerly Krypton), Snake, SUMMIT, Uroburos, Venomous Bear, and Waterbug, is assessed to be affiliated with Russia’s Federal Security Service (FSB).

Active for nearly 30 years, the threat actor employs a diverse and sophisticated toolset, including Snake, ComRAT, Carbon, Crutch, Kazuar, HyperStack (aka BigBoss), and TinyTurla. It primarily targets government, diplomatic, and military organizations.

The group also has a history of hijacking other threat actor’s infrastructure for its own purposes. In October 2019, the U.K. and U.S. governments revealed Turla’s exploitation of an Iranian threat actor’s backdoors to advance their own intelligence requirements.

“Turla accessed and used the command-and-control (C2) infrastructure of Iranian APTs to deploy their own tools to victims of interest,” the U.K. National Cyber Security Centre (NCSC) noted at the time. The Windows maker has since identified the Iranian hacking group to be OilRig.

Then in January 2023, Google-owned Mandiant noted that Turla had piggybacked on attack infrastructure used by a commodity malware called ANDROMEDA to deliver its own reconnaissance and backdoor tools to targets in Ukraine.

The third instance of Turla repurposing a different attacker’s tool was documented by Kaspersky in April 2023, when the Tomiris backdoor – attributed to a Kazakhstan-based threat actor tracked as Storm-0473 – was used to deploy QUIETCANARY in September 2022.

“The frequency of Secret Blizzard’s operations to co-opt or commandeer the infrastructure or tools of other threat actors suggests that this is an intentional component of Secret Blizzard’s tactics and techniques,” Microsoft noted.

Cybersecurity

The latest attack campaign detected by Black Lotus Labs and Microsoft shows that the threat actor utilized Storm-0156 C2 servers to deploy backdoors onto Afghan government devices, while in India, they targeted C2 servers hosting exfiltrated data from Indian military and defense-related institutions.

The compromise of Storm-0156 C2 servers has also enabled Turla to commandeer the former’s backdoors such as Crimson RAT and a previously undocumented Golang implant dubbed Wainscot. Black Lotus Labs told The Hacker News that it’s currently not known how the servers were compromised in the first place.

Specifically, Redmond said it observed Turla using a Crimson RAT infection that Storm-0156 had established in March 2024 to download and execute TwoDash in August 2024. Also deployed in victim networks alongside TwoDash is another custom downloader called MiniPocket that connects to a hard-coded IP address/port using TCP to retrieve and run a second-stage binary.

The Kremlin-backed attackers are further said to have laterally moved to the Storm-0156 operator’s workstation by likely abusing a trust relationship to obtain valuable intelligence pertaining to their tooling, C2 credentials, as well as exfiltrated data collected from prior operations, signaling a significant escalation of the campaign.

“This allows Secret Blizzard to collect intelligence on Storm-0156’s targets of interest in South Asia without targeting those organizations directly,” Microsoft said.

“Taking advantage of the campaigns of others allows Secret Blizzard to establish footholds on networks of interest with relatively minimal effort. However, because these initial footholds are established on another threat actor’s targets of interest, the information obtained through this technique may not align entirely with Secret Blizzard’s collection priorities.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Apple AI Pin Specs Leak: Dual Cameras, No Screen & More

The diverse responsibilities of a principal software engineer

OpenAI Backs Bill That Would Limit Liability for AI-Enabled Mass Deaths or Financial Disasters

Google’s Fitbit Tease has me More Excited for Garmin’s Whoop Rival

Why the TCL NXTPAPER 14 Is One of the Best Tablets for Musicians and Sheet Music Reading

TAGGED: Advanced Persistent Threat, Black Lotus Labs, cyber espionage, Cyber Security, Cybersecurity, Internet, Malware, Microsoft
Share This Article
Facebook Twitter Copy Link
Previous Article RateGain Travel bets on improving order pipeline for a recovery
Next Article Bitcoin Long-Term Holders Balances Fall To A New Low As Market Sentiment Shifts
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

JPMorgan CEO Jamie Dimon says he’s ‘learned and relearned’ to not make big decisions when he’s tired on Fridays
Business
Apple AI Pin Specs Leak: Dual Cameras, No Screen & More
Tech News
A ‘glass-like’ battlefield: German Army chief on the future of warfare
World News
Polymarket Sees Record $153M Daily Volume After Chainlink Integration
Crypto
Natasha Lyonne Then & Now: See Before & After Photos of the Actress Here
Celebrity
Cult Hit Doki Doki Literature Club Fights Removal From Google Play Store Over ‘Depiction Of Sensitive Themes’
Gaming News
Dead as Disco Launches Into Early Access on May 5th, Groovy New Gameplay Released
Gaming News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Investing £5 a day could help me build a second income of £329 a month!

JPMorgan CEO Jamie Dimon says he’s ‘learned and relearned’ to not make big decisions when he’s tired on Fridays

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
JPMorgan CEO Jamie Dimon says he’s ‘learned and relearned’ to not make big decisions when he’s tired on Fridays
April 10, 2026
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?