Turla’s Turmoil: Russia-Linked Hackers Hijack Rival’s Servers for Cyber Espionage Extravaganza

Turla, a Russia-linked threat group, has infiltrated a Pakistan-based hacking group, Storm-0156, to piggyback on its C2 servers. This strategic move lets Turla deploy its own malware while muddying attribution efforts, proving once again that in cyber-espionage, why build when you can just borrow?

Pro Dashboard

Hot Take:

Turla seems to have taken remote working to a whole new level by commandeering other hackers’ command-and-control servers! Forget borrowing a cup of sugar from your neighbor, these guys are borrowing entire cyber infrastructures! Talk about a real-life game of Risk where everyone’s a pawn, and Turla is the sneaky player flipping the board when no one’s watching. The lesson? Never trust the quiet neighbor with a suspiciously robust Wi-Fi network.

Key Points:

  • Turla, a Russia-linked APT group, infiltrated the C2 servers of Pakistan-based Storm-0156.
  • The group piggybacked on Storm-0156’s operations to deploy malware in Afghan government networks.
  • Turla has a history of hijacking other APTs’ infrastructures for its own purposes.
  • The campaign was detected by Black Lotus Labs and Microsoft Threat Intelligence.
  • Turla’s tactics involve commandeering others’ tools and infrastructure to obscure attribution.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?