Save over 40% when you secure your tickets today to TNW Conference 💥 Prices will increase on November 22 →

This article was published on October 22, 2019

Russian cyber spooks piggyback Iranian hackers to spy on 35 countries


Russian cyber spooks piggyback Iranian hackers to spy on 35 countries

Talk about hacking the hackers. Cybercriminals with ties to the Russian government have been found to piggyback on hacking tools developed by Iranian threat groups to mount their own attacks against 35 countries.

The findings — based on a joint report by the US National Security Agency and the UK’s National Cyber Security Centre (NCSC) — reveal the focus of the activity was largely in the Middle East, where the targeting interests of both Advanced Persistent Threats (APTs) overlap.

Named Turla (aka Snake, Uroburos, Waterbug, or Venomous Bear), the state-backed APT is believed to have infiltrated spyware tools such as Neuron and Nautilus — both of which are believed to be the handiwork of Iranian hackers — to further its own aims without their knowledge.

“Those behind Neuron or Nautilus were almost certainly not aware of, or complicit with, Turla’s use of their implants,” the NCSC said.

The 💜 of EU tech

The latest rumblings from the EU tech scene, a story from our wise ol' founder Boris, and some questionable AI art. It's free, every week, in your inbox. Sign up now!

The report also confirms previous research from Symantec back in June, which found one of Turla’s attacks to involve the use of infrastructure belonging to Iranian espionage collective known as APT 34 (aka OilRig or Crambus).

The fact that an Iranian hacking group was itself hacked by another group to spy on other countries and target more victims demonstrates the evolving sophistication of cyberattacks, not to mention the digital subterfuge employed by hackers to hide their tracks.

Per the NCSC, Turla went on to use the Iranian operational infrastructure to deploy its own rootkit implants to gather information on victims, namely military establishments, government departments, scientific organisations, and universities.

Aside from exploiting the Command and Control (C2) servers of Iranian APTs to deploy their own tools to victims of interest, the Kremlin-linked group focused its efforts on siphoning data off OilRig using keyloggers.

“This access gave Turla unprecedented insight into the tactics, techniques and procedures (TTPs) of the Iranian APT, including lists of active victims and credentials for accessing their infrastructure, along with the code needed to build versions of tools such as Neuron for use entirely independently of Iranian C2 infrastructure,” the NCSC concluded.

Get the TNW newsletter

Get the most important tech news in your inbox each week.

Also tagged with