A newly discovered malware program designed to infect Linux systems is tied to a sophisticated cyberespionage operation of Russian origin dubbed Epic Turla, security researchers found. The Turla ...
ESET researchers have investigated a distinctive backdoor used by the notorious Advanced Persistent Threat (APT) group known as Turla (or Snake, or Uroburos) to siphon off sensitive communications ...
In a first-of-its-kind discovery, ESET observed that the Gamaredon tool PteroGraphin was used to restart Turla group’s Kazuar backdoor on a machine in Ukraine. More recently, ESET detected that ...
Russian government-linked advanced persistent threat (APT) group Turla, which was revealed last year to have hijacked Iranian computer network operations resources to conduct its attacks and obfuscate ...
The Outlook backdoor used by Turla APT group for its espionage operations is an unusual beast built for stealth and persistence, capable to survive in highly restricted networks. The malware does not ...
The Russian-speaking APT stole the Neuron and Nautilus implants and accessed the Iranian APT’s C2 infrastructure. The Turla APT group has been spotted co-opting two cyberweapons from an Iranian APT ...
The Russian-speaking Turla advanced persistent threat group, among whose many victims include the US Department of State, appears to have developed a dangerous new tactic for installing its ...
A cyberespionage campaign involving malware known as Wipbot and Turla has systematically targeted the governments and embassies of a number of former Eastern Bloc countries. Trojan.Wipbot (known by ...
A dropper called “Topinambour” is the first-stage implant, which in turn fetches a spy trojan built in several coding languages. The Turla APT has revamped its arsenal in 2019, creating new weapons ...