Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Turla Exploits Cybercriminal Tools to Target Ukrainian Networks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Turla Exploits Cybercriminal Tools to Target Ukrainian Networks

Highlights

  • Turla targets Ukrainian military using adapted cybercriminal tools.

  • The group installs backdoors like Tavdig and KazuarV2 for access.

  • Turla extends operations to various global government and defense sectors.

Samantha Reed
Last updated: 11 December, 2024 - 8:10 pm 8:10 pm
Samantha Reed 6 months ago
Share
SHARE

In early 2024, Turla, a Russian nation-state threat actor, intensified its cyber activities against Ukraine by utilizing tools originally developed by other cybercriminal groups. Demonstrating adaptability, the group employed the Amadey bot malware to infiltrate Ukrainian military devices, showcasing a strategic blend of espionage and cybercrime tactics. This approach marks a significant shift in the methods employed by state-sponsored actors, highlighting the evolving landscape of cyber threats in geopolitical conflicts.

Contents
Turla’s Recent CampaignsUse of Amadey Bot MalwareExpansion to Diverse Targets

The current campaign aligns with prior observations of Turla’s behavior, where the group has historically repurposed malware from cybercriminals to advance its espionage objectives. Earlier incidents revealed similar tactics, indicating a consistent pattern in Turla’s operational strategies over the past few years.

Turla’s Recent Campaigns

Between March and April 2024, Turla, identified by Microsoft as Secret Blizzard, conducted operations targeting Ukrainian military devices. The group leveraged the Amadey bot malware, associated with the cybercriminal Storm-1919, to install sophisticated backdoors such as Tavdig and KazuarV2. These backdoors enabled sustained access to critical military networks, circumventing standard security protocols.

Use of Amadey Bot Malware

Originally designed for deploying cryptocurrency miners, the Amadey bot malware was adapted by Turla to gain unauthorized entry into sensitive networks.

“By repurposing existing malware tools, Turla demonstrates a high level of technical proficiency and resourcefulness,”

remarks a cybersecurity analyst. This methodology allows the group to exploit vulnerabilities without developing new malware from scratch.

Expansion to Diverse Targets

Beyond military systems, Turla has extended its operations to foreign ministries, embassies, government offices, and defense contractors globally. Recent research by Microsoft and Lumen Technology’s Black Lotus Labs revealed that Turla utilized networks linked to a Pakistani APT group to conduct espionage focused on Afghanistan and India.

Turla’s strategy of leveraging tools from other cybercriminal entities underscores the complexity of defending against state-sponsored cyber threats. By integrating existing malware into their arsenal, Turla enhances their operational efficiency and adaptability. Organizations, particularly those in geopolitically sensitive sectors, must bolster their cybersecurity measures and remain vigilant against such multifaceted attack vectors to mitigate potential breaches.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Trump Signs Executive Order Shifting Federal Cybersecurity Priorities

U.S. Authorities Seize $7.7M Linked to North Korean Crypto Laundering

Sean Cairncross Outlines Cyber Coordination Plans to Senate Panel

Feds Seize BidenCash Domains in Crackdown on Stolen Data Market

AI Drives Coding Boom, Sparks Security Debates in Software Development

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Google Launches Gemini 2.0 with Advanced AI Capabilities
Next Article Bad Viking Announces Sequel ‘Strange Antiquities’ with New Gameplay Features

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Wordle Players Guess “REUSE” and Learn from Daily Puzzles
Gaming
PlusAI Takes Public Path as It Pursues Autonomous Trucking Rollout
Robotics
Tesla Adds Heated Steering Wheel Update for Cold Weather Driving
Electric Vehicle
Industry Leaders Tackle Mobile Robot Integration in Warehouses
Robotics
Tesla Builds 8 Millionth Car as Model Y Leads Global Production
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?