Turla is a cyber espionage threat group that has been attributed to Russia's Federal Security Service (FSB). They have compromised victims in over 50 countries since at least 2004, spanning a range of industries including government, embassies, military, education, research and pharmaceutical companies. Turla is known for conducting watering hole and spearphishing campaigns, and leveraging in-house tools and malware, such as Uroburos.[1][2][3][4][5]
| Name | Description |
|---|---|
| IRON HUNTER | |
| Group 88 | |
| Waterbug |
Based similarity in TTPs and malware used, Turla and Waterbug appear to be the same group.[8] |
| WhiteBear |
WhiteBear is a designation used by Securelist to describe a cluster of activity that has overlaps with activity described by others as Turla, but appears to have a separate focus.[9][10] |
| Snake | |
| Krypton | |
| Venomous Bear | |
| Secret Blizzard | |
| BELUGASTURGEON |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1546 | .003 | 事件触发执行: Windows Management Instrumentation Event Subscription |
Turla has used WMI event filters and consumers to establish persistence.[11] |
| .013 | 事件触发执行: PowerShell Profile |
Turla has used PowerShell profiles to maintain persistence on an infected machine.[11] |
||
| Enterprise | T1213 | 从信息存储库获取数据 |
Turla has used a custom .NET tool to collect documents from an organization's internal central database.[14] |
|
| Enterprise | T1025 | 从可移动介质获取数据 |
Turla RPC backdoors can collect files from USB thumb drives.[11][15] |
|
| Enterprise | T1555 | .004 | 从密码存储中获取凭证: Windows Credential Manager |
Turla has gathered credentials from the Windows Credential Manager tool.[15] |
| Enterprise | T1005 | 从本地系统获取数据 |
Turla RPC backdoors can upload files from victim machines.[11] |
|
| Enterprise | T1090 | 代理 |
Turla RPC backdoors have included local UPnP RPC proxies.[11] |
|
| .001 | Internal Proxy |
Turla has compromised internal network systems to act as a proxy to forward traffic to C2.[10] |
||
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
Turla has named components of LunarWeb to mimic Zabbix agent logs.[16] |
| Enterprise | T1112 | 修改注册表 |
Turla has modified Registry values to store payloads.[11][15] |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Turla has used a custom decryption routine, which pulls key and salt values from other artifacts such as a WMI filter or PowerShell Profile, to decode encrypted PowerShell payloads.[11] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
A Turla Javascript backdoor added a local_update_check value under the Registry key |
| .004 | 启动或登录自动启动执行: Winlogon Helper DLL |
Turla established persistence by adding a Shell value under the Registry key |
||
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Turla has used PowerShell to execute commands/scripts, in some cases via a custom executable or code from Empire's PSInject.[17][11][15] Turla has also used PowerShell scripts to load and execute malware in memory. |
| .003 | 命令与脚本解释器: Windows Command Shell |
Turla RPC backdoors have used cmd.exe to execute commands.[11][15] |
||
| .005 | 命令与脚本解释器: Visual Basic | |||
| .006 | 命令与脚本解释器: Python |
Turla has used IronPython scripts as part of the IronNetInjector toolchain to drop payloads.[18] |
||
| .007 | 命令与脚本解释器: JavaScript | |||
| Enterprise | T1584 | .003 | 基础设施妥协: Virtual Private Server |
Turla has used the VPS infrastructure of compromised Iranian threat actors.[19] |
| .004 | 基础设施妥协: Server |
Turla has used compromised servers as infrastructure.[20][13][10] |
||
| .006 | 基础设施妥协: Web Services |
Turla has frequently used compromised WordPress sites for C2 infrastructure.[20] |
||
| Enterprise | T1120 | 外围设备发现 |
Turla has used |
|
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools |
Turla has used a AMSI bypass, which patches the in-memory amsi.dll, in PowerShell scripts to bypass Windows antimalware products.[11] |
| Enterprise | T1201 | 密码策略发现 |
Turla has used |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| .003 | 应用层协议: Mail Protocols |
Turla has used multiple backdoors which communicate with a C2 server via email attachments.[21] |
||
| Enterprise | T1587 | .001 | 开发能力: Malware |
Turla has developed its own unique malware for use in operations.[20] |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
Turla has encrypted files stolen from connected USB drives into a RAR file before exfiltration.[15] |
| Enterprise | T1083 | 文件和目录发现 |
Turla surveys a system upon check-in to discover files in specific locations on the hard disk %TEMP% directory, the current user's desktop, the Program Files directory, and Recent.[1][14] Turla RPC backdoors have also searched for files matching the |
|
| Enterprise | T1110 | 暴力破解 |
Turla may attempt to connect to systems within a victim's network using |
|
| Enterprise | T1078 | .003 | 有效账户: Local Accounts |
Turla has abused local accounts that have the same password across the victim’s network.[22] |
| Enterprise | T1106 | 本机API |
Turla and its RPC backdoors have used APIs calls for various tasks related to subverting AMSI and accessing then executing commands through RPC and/or named pipes.[11] |
|
| Enterprise | T1068 | 权限提升漏洞利用 |
Turla has exploited vulnerabilities in the VBoxDrv.sys driver to obtain kernel mode privileges.[23] |
|
| Enterprise | T1069 | .001 | 权限组发现: Local Groups |
Turla has used |
| .002 | 权限组发现: Domain Groups |
Turla has used |
||
| Enterprise | T1012 | 查询注册表 |
Turla surveys a system upon check-in to discover information in the Windows Registry with the |
|
| Enterprise | T1570 | 横向工具传输 |
Turla RPC backdoors can be used to transfer files to/from victim machines on the local network.[11][15] |
|
| Enterprise | T1189 | 浏览器攻击 | ||
| Enterprise | T1027 | .005 | 混淆文件或信息: Indicator Removal from Tools |
Based on comparison of Gazer versions, Turla made an effort to obfuscate strings in the malware that could be used as IoCs, including the mutex name and named pipe.[2] |
| .010 | 混淆文件或信息: Command Obfuscation |
Turla has used encryption (including salted 3DES via PowerSploit's |
||
| .011 | 混淆文件或信息: Fileless Storage |
Turla has used the Registry to store encrypted and encoded payloads.[11][15] |
||
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Turla has used spearphishing via a link to get users to download and run their malware.[4] |
| Enterprise | T1082 | 系统信息发现 |
Turla surveys a system upon check-in to discover operating system configuration details using the |
|
| Enterprise | T1124 | 系统时间发现 |
Turla surveys a system upon check-in to discover the system time by using the |
|
| Enterprise | T1007 | 系统服务发现 |
Turla surveys a system upon check-in to discover running services and associated processes using the |
|
| Enterprise | T1049 | 系统网络连接发现 |
Turla surveys a system upon check-in to discover active local network connections using the |
|
| Enterprise | T1016 | 系统网络配置发现 |
Turla surveys a system upon check-in to discover network configuration details using the |
|
| .001 | Internet Connection Discovery | |||
| Enterprise | T1615 | 组策略发现 |
Turla surveys a system upon check-in to discover Group Policy details using the |
|
| Enterprise | T1102 | 网络服务 |
Turla has used legitimate web services including Pastebin, Dropbox, and GitHub for C2 communications.[13][22] |
|
| .002 | Bidirectional Communication |
A Turla JavaScript backdoor has used Google Apps Script as its C2 server.[4][17] |
||
| Enterprise | T1583 | .006 | 获取基础设施: Web Services |
Turla has created web accounts including Dropbox and GitHub for C2 and document exfiltration.[22] |
| Enterprise | T1588 | .001 | 获取能力: Malware |
Turla has used malware obtained after compromising other threat actors, such as OilRig.[19][20] |
| .002 | 获取能力: Tool |
Turla has obtained and customized publicly-available tools like Mimikatz.[15] |
||
| Enterprise | T1134 | .002 | 访问令牌操控: Create Process with Token |
Turla RPC backdoors can impersonate or steal process tokens before executing commands.[11] |
| Enterprise | T1087 | .001 | 账号发现: Local Account |
Turla has used |
| .002 | 账号发现: Domain Account |
Turla has used |
||
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
Turla has obtained information on security software, including security logging information that may indicate whether their malware has been detected.[14] |
| Enterprise | T1105 | 输入工具传输 |
Turla has used shellcode to download Meterpreter after compromising a victim.[17] |
|
| Enterprise | T1057 | 进程发现 |
Turla surveys a system upon check-in to discover running processes using the |
|
| Enterprise | T1055 | 进程注入 |
Turla has also used PowerSploit's |
|
| .001 | Dynamic-link Library Injection |
Turla has used Metasploit to perform reflective DLL injection in order to escalate privileges.[17][24] |
||
| Enterprise | T1021 | .002 | 远程服务: SMB/Windows Admin Shares |
Turla used |
| Enterprise | T1018 | 远程系统发现 |
Turla surveys a system upon check-in to discover remote systems on a local network using the |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
Turla has used WebDAV to upload stolen USB files to a cloud drive.[15] Turla has also exfiltrated stolen files to OneDrive and 4shared.[14] |
| Enterprise | T1566 | .002 | 钓鱼: Spearphishing Link |
Turla attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from Adobe.com to download their malware and gain initial access.[4] |
| Enterprise | T1564 | .012 | 隐藏伪装: File/Path Exclusions |
Turla has placed LunarWeb install files into directories that are excluded from scanning.[16] |
| Enterprise | T1553 | .006 | 颠覆信任控制: Code Signing Policy Modification |
Turla has modified variables in kernel memory to turn off Driver Signature Enforcement after exploiting vulnerabilities that obtained kernel mode privileges.[23][25] |