Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Russian Cyber Group Turla Exploits Pakistani APT Networks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Russian Cyber Group Turla Exploits Pakistani APT Networks

Highlights

  • Turla exploited Pakistani APT networks for espionage operations.

  • The group deployed malware in Afghan and Indian government systems.

  • Security firms are actively blocking and tracking Turla’s activities.

Samantha Reed
Last updated: 4 December, 2024 - 8:08 pm 8:08 pm
Samantha Reed 5 months ago
Share
SHARE

A persistent Russian cyber-espionage faction, Turla, affiliated with the Federal Security Service, has been identified infiltrating Pakistani APT networks. This sophisticated maneuver, spanning from December 2022 to mid-2023, represents the fourth instance of Turla integrating into another threat actor’s operations since 2019. The group has leveraged Pakistani command-and-control servers to expand its reach, targeting government and military infrastructures in Afghanistan and India.

Contents
How Did Turla Gain Access to Pakistani APT Infrastructure?What Impact Did Turla’s Operations Have on Targeted Networks?How Are Security Firms Responding to Turla’s Tactics?

Turla’s strategy showcases a continued trend of cyber espionage collaboration, where established tactics are employed to penetrate sensitive networks. Previous investigations have linked Turla to various high-profile cyberattacks, emphasizing their longstanding presence in the espionage landscape.

How Did Turla Gain Access to Pakistani APT Infrastructure?

According to reports from Microsoft’s Threat Intelligence Center and Lumen’s Black Lotus Labs, Turla initially accessed a Pakistani command-and-control server in December 2022. By mid-2023, their control extended to multiple C2 nodes associated with Storm-0156, also known as APT-36. This access allowed Turla to deploy their own malware, including “TwoDash” and “Statuezy,” within Afghan government networks.

What Impact Did Turla’s Operations Have on Targeted Networks?

Turla’s deployment of backdoors in Afghanistan’s Ministry of Foreign Affairs and the General Directorate of Intelligence facilitated unauthorized access to sensitive data. In India, their tools were used to infiltrate servers housing exfiltrated military data. Notably, the TwoDash backdoor was deployed directly to an Indian desktop, indicating targeted espionage activities.

How Are Security Firms Responding to Turla’s Tactics?

“We’ve seen those highly-skilled espionage actors who can work through cutouts [and] will do that whenever they can,” said Ryan English, an engineer with Black Lotus Labs. “I think Secret Blizzard is patient enough and skilled enough to look for those opportunities. It certainly can benefit any group that has the ability to [use other groups’ infrastructure], but in practice, it is harder than it looks.”

In response, Lumen has implemented measures to block traffic to known hostile IP addresses linked to Turla and APT-36. Microsoft and Lumen continue to update their threat intelligence feeds with indicators of compromise to aid in mitigating future breaches.

Turla’s infiltration methods highlight a strategic shift towards using existing threat actor infrastructures to mask their activities. This approach not only diversifies their intelligence-gathering capabilities but also complicates attribution efforts during incident responses, making it challenging to identify the true source of cyberattacks.

The integration of Pakistani APT networks by Turla underscores the evolving landscape of cyber espionage, where collaboration between different threat actors enhances the effectiveness and stealth of operations. Organizations should remain vigilant and adopt comprehensive security measures to counter such sophisticated infiltration techniques.

  • Turla exploited Pakistani APT networks for espionage operations.
  • The group deployed malware in Afghan and Indian government systems.
  • Security firms are actively blocking and tracking Turla’s activities.
You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Trump Urges Colorado to Release Jailed Clerk Over Election Breach

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Cubic Telecom Partners with Skylo for Enhanced Vehicle Connectivity
Next Article Intel Unveils XeSS 2 and Battlemage GPUs to Boost Gaming Performance

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

ABB Advances AMR Technology with vSLAM for Enhanced Operations
Robotics
Tesla Semi Gains Momentum with US Foods Collaboration
Electric Vehicle
AMD’s New Graphics Card Threatens Nvidia’s Market Share
Computing
Dodge Charger Hits Tesla Cybertruck in Failed Stunt
Electric Vehicle
Sonair Unveils ADAR Sensor to Enhance Robot Safety
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?