Turla’s Turmoil: Russia-Linked Hackers Hijack Rival’s Servers for Cyber Espionage Extravaganza
Turla, a Russia-linked threat group, has infiltrated a Pakistan-based hacking group, Storm-0156, to piggyback on its C2 servers. This strategic move lets Turla deploy its own malware while muddying attribution efforts, proving once again that in cyber-espionage, why build when you can just borrow?

Hot Take:
Turla seems to have taken remote working to a whole new level by commandeering other hackers’ command-and-control servers! Forget borrowing a cup of sugar from your neighbor, these guys are borrowing entire cyber infrastructures! Talk about a real-life game of Risk where everyone’s a pawn, and Turla is the sneaky player flipping the board when no one’s watching. The lesson? Never trust the quiet neighbor with a suspiciously robust Wi-Fi network.
Key Points:
- Turla, a Russia-linked APT group, infiltrated the C2 servers of Pakistan-based Storm-0156.
- The group piggybacked on Storm-0156’s operations to deploy malware in Afghan government networks.
- Turla has a history of hijacking other APTs’ infrastructures for its own purposes.
- The campaign was detected by Black Lotus Labs and Microsoft Threat Intelligence.
- Turla’s tactics involve commandeering others’ tools and infrastructure to obscure attribution.
Already a member? Log in here