Tomiris espande nel 2025 il proprio arsenale con impianti multi-linguaggio, C2 su Telegram e Discord, framework Havoc e AdaptixC2 e targeting diplomatico.
#AdaptixC2 #Havoc #Telegram #Tomiris #Turla
www.matricedigitale.it/2025/12/01/t...
Latest posts tagged with #Turla on Bluesky
Tomiris espande nel 2025 il proprio arsenale con impianti multi-linguaggio, C2 su Telegram e Discord, framework Havoc e AdaptixC2 e targeting diplomatico.
#AdaptixC2 #Havoc #Telegram #Tomiris #Turla
www.matricedigitale.it/2025/12/01/t...
🚨 2025.05 RESEARCH
Static Analysis of Turla’s Uroboros: Revealing Core Tactics and Technical Mindset
🔗malwareanalysisspace.blogspot.com/2025/05/static-analysis-...
#Turla #Uroboros #kernel #rootkit #CoreTactics #TechnicalMindset
ESET reveals Turla and Gamaredon collaboration
ESET reports FSB‑linked groups Turla and Gamaredon coordinated in Ukraine, with Gamaredon deploying Ptero tools while Turla installed Kazuar v3 on compromised machines during four incidents in February. Read more: getnews.me/eset-reveals-turla-and-g... #turla #gamaredon
Two of the Kremlin’s most active hack groups are collaborating, ESET says https://arstechni.ca #advancedpersistentthreat #gamaredon #Security #Biz&IT #russia #turla #APT
Two of the Kremlin’s most active hack groups are collaborating, ESET says Turla is getting a helping hand from Gamaredon. Both are units of Russia's FSB. Two of the Kremlin’s most active ha...
#Biz #& #IT #Security #advanced #persistent #threat #APT […]
[Original post on arstechnica.com]
Russian hacking groups Gamaredon and Turla collaborate to deploy Kazuar backdoor in Ukraine, marking a significant escalation in coordinated cyber operations. #CyberSecurity #Ukraine #Gamaredon #Turla Link: thedailytechfeed.com/russian-cybe...
Russian cyber groups Turla and Gamaredon collaborate in targeted attacks on Ukraine, deploying sophisticated malware to compromise sensitive systems. #CyberSecurity #Ukraine #Turla #Gamaredon Link: thedailytechfeed.com/collaboratio...
Gamaredon e Turla cooperano in Ucraina: PteroGraphin riavvia Kazuar, accesso massivo e impianto selettivo elevano il rischio per reti governative.
#ESET #evidenza #fsb #Gamaredon #Kazuar #PteroGraphin #turla #ucraina
www.matricedigitale.it/2025/09/19/g...
Russia uses domestic ISPs to spy on diplomats, warns Microsoft
www.databreachtoday.com/russia-uses-... #SecretBlizzard #Turla
Microsoft: Russian State Hackers Are Spying on Embassies via ISP-Level Attacks
#CyberSecurity #Russia #Microsoft #Hacking #FSB #Turla #ThreatIntel
winbuzzer.com/2025/07/31/m...
More work on the grunt
#halo #fanart #grunt #spv3 #legacies #halolegacies #turla #turtle #wip #characterart
ロシアの秘密のブリザードAPTがKazuarバックドアでウクライナを標的に
Russia’s Secret Blizzard APT targets Ukraine with Kazuar backdoor #SecurityAffairs (Sec 12)
#シークレットブリザード #Turla #ウクライナ軍 #サイバー攻撃 #マルウェア
russia-backed #SecretBlizzard (aka #Turla) APT group leverages offensive tools and infrastructure of other hacking collectives to target Ukraine with KazuarV2 backdoor. Detect associated malicious activity with #Sigma rules.
socprime.com/blog/secret-...
#cybersecurity #infosec
ロシアのスパイにとって、既存のサイバー犯罪ツールはウクライナの軍事装置への侵入経路となる
For Russian spies, existing cybercrime tools become avenues into Ukrainian military devices #TheRecord (Dec 12)
#シークレットブリザード #Turla #ウクライナ軍 #サイバー攻撃 #マルウェア
#Turla living off other cybercriminals’ tools in order to attack #Ukrainian targets cyberscoop.com/turla-levera...
Russia-linked APT group Secret Blizzard is using Amadey Malware-as-a-Service to infect systems in Ukraine with the Kazuar backdoor. #Turla, #Snake, #Uroburos
securityaffairs.com/171896/apt/s...
ロシアのサイバースパイが他のハッカーの背後に隠れてウクライナを狙う
Russian cyber spies hide behind other hackers to target Ukraine #BleepingComputer (Dec 11)
#Turla #シークレットブリザード #ウクライナ #サイバー諜報 #マルウェア
🇷🇺 Frequent freeloader part II: Russian actor Secret Blizzard (aka #Turla) using tools of other groups to attack Ukraine
More on the same #cybersecurity topic.
#VenomousBear #SecretBlizzard #Turla
www.microsoft.com/en-us/securi...
#ロシア 関連 #APTグループ #Turla 、 #パキスタン グループのサーバー利用し #アフガン および #インド の標的を狙う | Codebook|Security News
Black Lotus Labsによれば、同研究チームが2022年12月に初めて観測した攻撃 ... インテリジェンス要件定義に関するガイドブック:『要件主導型インテリジェンス ...
codebook.machinarecord.com/threatreport...
I was talking to a colleague about that #turla breach of #sidecopy that was released by Lumen and MSTIC.
He reminded me of something that seems to be a trend among this group. They did similar things to #oilrig in 2019
www.ncsc.gov.uk/news/turla-g...
Not So False Flag: the Adversary of my Adversary is my … -> www.conquer-your-risk.com/2024/12/05/n...
#cyber #threatintel #falseflag #malware #turla #apt28 #lazarus #apt34 #counterintelligence #deception
ロシアのハッカーがパキスタンのハッカーのサーバーを乗っ取り、自らの攻撃に利用
Russian hackers hijack Pakistani hackers' servers for their own attacks #BleepingComputer (Dec 4)
#サイバー諜報 #Turla #Storm-0156 #インフラ乗っ取り #ロシア連邦保安庁
זה באמת סיפור נחמד: קבוצת התקיפה הרוסית #Turla השתלטה על רשת של קבוצת תקיפה פקיסטנית (Storm-0156), והשתמשה בתשתית שלה כדי להפיץ רושעות, רוגלות ושאר קוקיות משל עצמה לקורבנות בהודו, אפגניסטאן.
blog.lumen.com/snowblind-the-invisible-...
#AttributionWars #Cyber
How 🇷🇺 #Turla used the infrastructure of 🇵🇰 #APT36 to install backdoors and collect intelligence on targets of interest in South Asia.
Russian-linked #Turla caught using #Pakistani #APT #infrastructure for #espionage. Both Microsoft and Lumen’s BlackLotus Labs found Turla #spying on #Afghanistan and #India via Pakistani infrastructure. via @gregotto.bsky.social cyberscoop.com/turla-infilt...