• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
russian hackers tomiris targeting central asia for intelligence gathering

Russian Hackers Tomiris Targeting Central Asia for Intelligence Gathering

You are here: Home / General Cyber Security News / Russian Hackers Tomiris Targeting Central Asia for Intelligence Gathering
April 24, 2023

The Russian-talking danger actor at the rear of a backdoor recognised as Tomiris is generally concentrated on gathering intelligence in Central Asia, fresh new results from Kaspersky reveal.

“Tomiris’s endgame continually appears to be the regular theft of internal files,” security scientists Pierre Delcher and Ivan Kwiatkowski claimed in an examination posted currently. “The risk actor targets authorities and diplomatic entities in the CIS.”

The Russian cybersecurity firm’s latest assessment is primarily based on a few new attack strategies mounted by the hacking crew involving 2021 and 2023.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Tomiris 1st arrived to gentle in September 2021 when Kaspersky highlighted its probable connections to Nobelium (aka APT29, Cozy Bear, or Midnight Blizzard), the Russian country-state group at the rear of the SolarWinds offer chain attack.

Similarities have also been unearthed involving the backdoor and an additional malware pressure dubbed Kazuar, which is attributed to the Turla team (aka Krypton, Key Blizzard, Venomous Bear, or Uroburos).

Spear-phishing attacks mounted by the group have leveraged a “polyglot toolset” comprising a selection of lower-sophistication “burner” implants that are coded in distinctive programming languages and consistently deployed against the exact targets.

Aside from employing open supply or commercially accessible offensive resources, the tailor made malware arsenal employed by the group falls into one of the a few classes: downloaders, backdoors, and information and facts stealers –

  • Telemiris – A Python backdoor that makes use of Telegram as a command-and-handle (C2) channel.
  • Roopy – A Pascal-based mostly file stealer that’s created to hoover information of curiosity every 40-80 minutes and exfiltrate them to a distant server.
  • JLORAT – A file stealer created in Rust that gathers program info, runs instructions issued by the C2 server, add and down load data files, and capture screenshots.

Kaspersky’s investigation of the attacks has even further determined overlaps with a Turla cluster tracked by Google-owned Mandiant beneath the title UNC4210, uncovering that the QUIETCANARY (aka TunnusSched) implant had been deployed against a government concentrate on in the CIS by indicates of Telemiris.

“Extra precisely, on September 13, 2022, all-around 05:40 UTC, an operator attempted to deploy various acknowledged Tomiris implants by means of Telemiris: to start with a Python Meterpreter loader, then JLORAT and Roopy,” the scientists discussed.

Impending WEBINARZero Believe in + Deception: Discover How to Outsmart Attackers!

Learn how Deception can detect state-of-the-art threats, end lateral motion, and enhance your Zero Trust method. Join our insightful webinar!

Help you save My Seat!

“These initiatives had been thwarted by security products, which led the attacker to make repeated makes an attempt, from many destinations on the filesystem. All these tries ended in failure. Soon after a 1-hour pause, the operator attempted again at 07:19 UTC, this time working with a TunnusSched/QUIETCANARY sample. The TunnusSched sample was blocked as effectively.”

That explained, inspite of the likely ties amongst the two groups, Tomiris is reported to be individual from Turla owing to variations in their concentrating on and tradecrafts, as soon as once again elevating the risk of a false flag procedure.

On the other hand, it is really also highly probable that Turla and Tomiris collaborate on pick functions or that both of those the actors count on a frequent software package supplier, as exemplified by Russian military intelligence agencies’ use of instruments supplied by a Moscow-primarily based IT contractor named NTC Vulkan.

“Overall, Tomiris is a extremely agile and determined actor, open to experimentation,” the researchers reported, introducing “there exists a type of deliberate cooperation concerning Tomiris and Turla.”

Uncovered this posting exciting? Follow us on Twitter  and LinkedIn to go through additional exclusive content material we write-up.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «ransomware hackers using aukill tool to disable edr software using Ransomware Hackers Using AuKill Tool to Disable EDR Software Using BYOVD Attack
Next Post: Tomiris and Turla APT Groups Collaborate to Target Government Entities Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Enzo Biochem Hit by Ransomware, 2.5 Million Patients’ Data Compromised
  • US and Korean Agencies Issue Warning on North Korean Cyber-Attacks
  • Malicious PyPI Packages Use Compiled Python Code to Bypass Detection
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • The Importance of Managing Your Data Security Posture
  • Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
  • Insurers Predict $33bn Bill for Catastrophic “Cyber Event”
  • Chinese Phishing Gang “PostalFurious” Expands Campaign
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.