Hitmetrix - User behavior analytics & recording

Turla hijacks Storm-0156 servers for espionage

Hijacks Espionage
Hijacks Espionage

The Russia-linked advanced persistent threat (APT) group Turla has been caught in a sophisticated cyber espionage campaign. Turla infiltrated the command-and-control (C2) servers of the Pakistan-based hacking group Storm-0156, which it has used to conduct its own operations since 2022.

Black Lotus Labs, part of Lumen Technologies, first observed this in December 2022. By mid-2023, Turla had expanded their control to multiple C2 servers associated with Storm-0156. Turla used the access to these servers to deploy custom malware families across various Afghan government networks.

The malware included TwoDash, a bespoke downloader, and Statuezy, a trojan that logs data saved to the Windows clipboard. Microsoft Threat Intelligence confirmed that Turla used Storm-0156’s infrastructure in cyber campaigns in Afghanistan and India. Turla, also known as Blue Python, Iron Hunter, and Venomous Bear, is affiliated with Russia’s Federal Security Service (FSB).

Active for nearly 30 years, Turla targets government, diplomatic, and military organizations. The group has a history of hijacking other threat actors’ infrastructure for their own espionage activities.

Turla exploits Storm-0156 servers

In previous instances, Turla utilized infrastructure from Iranian APTs and other malware operators to deploy its tools. In January 2023, Google-owned Mandiant reported that Turla piggybacked on the infrastructure of the commodity malware ANDROMEDA in Ukraine. In April 2023, Kaspersky revealed Turla’s use of the Kazakhstan-based Storm-0473’s tools to deploy the QUIETCANARY backdoor.

The compromise of Storm-0156 C2 servers enabled Turla to repurpose backdoors and deploy a previously undocumented Golang implant named Wainscot. Turla used a Crimson RAT infection established by Storm-0156 in March 2024 and August 2024 to deploy TwoDash. A custom downloader called MiniPocket was also observed in the victim networks.

The Kremlin-backed attackers moved laterally within the Storm-0156 operator’s workstation. They gained valuable intelligence about their tools, C2 credentials, and exfiltrated data. This strategy allows Turla to gather intelligence without directly targeting organizations of interest.

It minimizes effort while gaining significant data. Microsoft noted, “The frequency of Secret Blizzard’s operations to commandeer the infrastructure or tools of other threat actors suggests that this is an intentional component of their tactics.”

The latest attack campaign underscores Turla’s evolving threats and highlights the importance of robust cybersecurity measures to defend against such sophisticated adversaries.

Total
0
Shares
Related Posts