Monday, March 10, 2025
24.3 C
Islamabad
HomeTechnologyTurla Hackers Attack Pakistani Servers to Steal Indian and Afghan Secrets

Turla Hackers Attack Pakistani Servers to Steal Indian and Afghan Secrets

Find out how Turla leveraged existing Storm-0156 hacks without initiating direct attacks, ensuring covert access to sensitive Indian systems.

The Russia-linked APT group Turla has orchestrated a covert operation involving the infiltration of command-and-control (C2) servers belonging to the Pakistan-based hacking group Storm-0156. This activity, observed since December 2022, represents Turla’s strategic approach of embedding itself within another actor’s operations to achieve its own goals while complicating attribution.

By mid-2023, Turla had expanded its control over multiple C2 servers initially compromised by Storm-0156. The group utilized these servers to deploy bespoke malware, including TwoDash and Statuezy, targeting networks associated with Afghan government entities. TwoDash functions as a downloader, while Statuezy operates as a trojan that logs and monitors clipboard activity on Windows devices. These tools allowed Turla to leverage existing Storm-0156 intrusions without initiating direct attacks, enabling covert access to sensitive systems.

Also Read: Broadcasters urge PEMRA to reverse TV ratings ban

Leveraging Infrastructure for Espionage and Broader Implications

Microsoft’s analysis further reveals that Turla exploited Storm-0156 infrastructure, including using the Crimson RAT and an undocumented implant named Wainscot. This enabled Turla to expand its foothold across South Asian networks, gathering intelligence from systems in Afghanistan and India. Notably, the group moved laterally within Storm-0156’s operations, accessing workstations and obtaining valuable credentials, tools, and exfiltrated data.

Turla’s actions are consistent with its history of hijacking other threat actors’ tools and infrastructure. In 2019, Turla utilized an Iranian APT’s infrastructure to deploy its tools. More recently, it piggybacked on the Andromeda malware infrastructure in Ukraine in 2023 and repurposed the Tomiris backdoor in Kazakhstan. These repeated instances indicate a deliberate tactic to exploit existing operations, reducing resource expenditure while maintaining effective espionage campaigns.

Escalating the Campaign

Turla’s lateral movement within Storm-0156’s infrastructure signals a significant escalation. By compromising operator workstations, the group gained insights into Storm-0156’s tooling and targets, including intelligence on Afghan government systems and Indian defense-related institutions. This approach allowed Turla to indirectly collect information from South Asian organizations without directly targeting them, underscoring its resourcefulness and sophistication.

This strategy of hijacking other actors’ infrastructure enables Turla to maintain a low profile while infiltrating high-value networks. However, the information obtained may not always align with Turla’s primary objectives due to the reliance on another group’s initial access.

A Growing Threat to Regional Security

The latest findings by Lumen Technologies’ Black Lotus Labs and Microsoft emphasize the evolving threat posed by Turla. By capitalizing on Storm-0156’s infrastructure, the Kremlin-backed group continues to demonstrate its adaptability and proficiency in advanced cyber-espionage tactics.

Latest News

[td_block_social_counter style="" custom_title="Follow us" block_template_id="td_block_template_11" border_color="#dd3333" f_header_font_size="eyJhbGwiOiIyNSIsInBvcnRyYWl0IjoiMTgifQ==" f_header_font_weight="600" f_header_font_family="" f_header_font_transform="uppercase" tdc_css="eyJwb3J0cmFpdCI6eyJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3NjgsInBob25lIjp7Im1hcmdpbi1ib3R0b20iOiI0MCIsImRpc3BsYXkiOiIifSwicGhvbmVfbWF4X3dpZHRoIjo3NjcsImFsbCI6eyJtYXJnaW4tYm90dG9tIjoiNSIsImRpc3BsYXkiOiIifX0=" facebook="TheDiplomaticInsight" youtube="channel/UCRN6KNyDfHfiNYj3xjR1o7A" twitter="DiplomaticIns" title_tag="h3"]

Related News