Technology Other News 20 Jul 2019 Military attacking T ...

Military attacking Turla malware is back

DECCAN CHRONICLE
Published Jul 20, 2019, 11:34 am IST
Updated Jul 20, 2019, 11:34 am IST
Topinambour was spotted in an operation against government entities at the start of 2019.
Turla is a high profile Russian-speaking threat actor with a known interest in cyberespionage against government and diplomatic related targets. (Photo: Pixabay)
 Turla is a high profile Russian-speaking threat actor with a known interest in cyberespionage against government and diplomatic related targets. (Photo: Pixabay)

Kaspersky researchers have discovered that the Russian-speaking threat actor Turla has revamped its toolset – wrapping its famous JavaScript KopiLuwak malware in a new dropper called Topinambour, creating two similar versions in other languages, and distributing its malware through infected installation packs for software that circumvents internet censorship, among others. Researchers believe these measures are designed to minimize detection and precision target victims. Topinambour was spotted in an operation against government entities at the start of 2019.

Turla is a high profile Russian-speaking threat actor with a known interest in cyberespionage against the government and diplomatic related targets. It has a reputation for being innovative and for its signature KopiLuwak malware, first observed in late 2016. In 2019, Kaspersky researchers uncovered new tools and techniques introduced by the threat actor that increase stealth and help to minimize detection.

 

Topinambour (named after the vegetable that is also known as a Jerusalem artichoke) is a new .NET file that is being used by Turla to distribute and drop its JavaScript KopiLuwak through infected installation packages for legitimate software programs like VPNs for circumventing internet censorship.

KopiLuwak is designed for cyberespionage and Turla’s latest infection process includes techniques that help the malware to avoid detection.  For example, the command and control infrastructure has IPs that appear to mimic ordinary LAN addresses. Further, the malware is almost completely ‘fileless’ – the final stage of infection, an encrypted Trojan for remote administration, is embedded into the computer’s registry for the malware to access when ready.

The two KopiLuwak analogues – the .NET RocketMan Trojan and the PowerShell MiamiBeach Trojan are also designed for cyberespionage.  Researchers believe that these versions are deployed against targets with security software installed that is able to detect KopiLuwak. Upon successful installation, all three versions can – Fingerprint targets, to understand what kind of computer has been infected, gather information on the system and network adapters, steal files, download and execute additional malware and MiamiBeach is also able to take screenshots.

Click on Deccan Chronicle Technology and Science for the latest news and reviews. Follow us on Facebook, Twitter

...




ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT