• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Backdoor And Document Stealer Tied To Russia’s Turla Group

Backdoor and document stealer tied to Russia’s Turla group

You are here: Home / General Cyber Security News / Backdoor and document stealer tied to Russia’s Turla group

Researchers at ESET claimed they discovered a formerly undocumented backdoor and document stealer – dubbed “Crutch” by its developers – that they can attribute to the infamous Russian hacker team Turla.

In a web site posted previously currently, ESET mentioned Turla employed Crutch in opposition to various equipment of the Ministry of International Affairs in an unspecified European Union state. The Crutch toolset was intended to exfiltrate sensitive paperwork and other information to DropBox accounts controlled by Turla operators.

ESET experiences that Crutch was made use of from 2015 to at the very least early 2020. The researchers think that Turla takes advantage of this malware loved ones only towards incredibly specific targets, which runs steady with many of the Turla group’s toolsets.

✔ Approved Seller by TheCyberSecurity From Our Partners
F Secure Freedome Vpn 2021

Protect your online privacy and internet browsing via F-Secure Freedome VPN. F-Secure has proven to be a trustworthy company but not being connected to any government. F-Secure Freedome VPN encryptes all your connections to the internet in addition it hides your real IP address so no one will know from which location you are browsing the web. F-Secure Freedome VPN is Netflix and Amazon Prime friendly which means you can easily view the movies and series that are meant for Amercian viewers.

Get F-Secure Freedome VPN with 50% discount from our partner: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The researchers stated they captured some of the instructions sent by the operators to a number of Crutch v3 scenarios, which was helpful in knowledge the intention of the operation. In accordance to the scientists, the operators ended up mainly undertaking reconnaissance, lateral movement and espionage. The primary destructive exercise was the staging, compression and exfiltration of paperwork and many files.

When requested the variety of files stolen, an ESET spokeswomen could not specify and just explained “many” paperwork had been lifted. She also reported the scientists had visibility into the type of file formats (.pdf, .docx, and so on.) of the files stolen and constrained visibility into the actual material.

Turla has been energetic in cyberespionage due to the fact 2005. It has compromised lots of governments, specially diplomatic entities, all all-around the planet, running a huge malware arsenal that ESET has prepared about above the yrs. The discovery of Crutch even further strengthens the perception that the Turla group has considerable means to work this kind of a big and assorted arsenal.

Austin Merritt, cyber menace intelligence analyst at Electronic Shadow, explained because Turla’s inception in the 2000s, the group has persistently progressed using custom-made backdoor malware, malware droppers, and distant entry equipment to reach intelligence-collecting objectives on governing administration targets this kind of as embassies, ministries, and intelligence agencies.

“Turla’s ‘Crutch’ backdoor is most likely becoming used for reconnaissance and surveillance, in particular with the group’s identified affiliation with things of the Russian state in espionage strategies,” Merritt explained. “It’s extra very likely that menace actors will leverage the Crutch backdoor as a next-stage backdoor for knowledge exfiltration somewhat than an initial access vector.”

Matthew Westfall, senior software security marketing consultant at nVisium, extra that today’s research will likely give clues about previous campaigns. As a sensible matter, Westfall claimed security teams ought to include these indicators of compromise to any security toolsets (network and host-dependent IDS, DNS sinkholes) currently in use.

“Threat hunters should really also look for present SIEM tooling for evidence of past malicious exercise, particularly if they are between Turla APT’s standard targets,” Westfall said. “Because earlier campaigns attributed to Turla operators have experienced lapses in operational security, there’s the opportunity for defenders to uncover intriguing facts.”


Some sections of this article are sourced from:
www.scmagazine.com

Previous Post: «Fcc Chair Departure Leaves Open The Door For Greater Agency FCC chair departure leaves open the door for greater agency influence in cyber, 5G rollout
Next Post: Cyber escape room locks in employees’ security awareness. But can SC Media beat the clock? Cyber Escape Room Locks In Employees’ Security Awareness. But Can»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Big Tech Bans Social Networking App
  • Lack of Funding Could Lead to “Lost Generation” of Cyber-Startups
  • Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor
  • ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform
  • DarkSide decryptor unlocks systems without ransom payment – for now
  • Researchers see links between SolarWinds Sunburst malware and Russian Turla APT group
  • Millions of Social Profiles Leaked by Chinese Data-Scrapers
  • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
  • SolarWinds Hack Potentially Linked to Turla APT
  • 10 quick tips to identifying phishing emails

Copyright © TheCyberSecurity.News, All Rights Reserved.