Breaking News

Kioxia and Dell Technologies First to Deliver High-Density Server with 9.8 PB of Flash Storage ASUS Republic of Gamers Announces ROG NUC 16 Silicon Power Launches CreatePro Series Newtro Cooling Series and Next-Gen LCD Coolers at Computex 2026 Sony Announces the Launch of Xperia 1 VIII

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

UK and US Intelligence Exposes Russian Turla Group Attack Against Iranian Hackers

UK and US Intelligence Exposes Russian Turla Group Attack Against Iranian Hackers

Enterprise & IT Oct 21,2019 0

Russian hackers acquired Iranian tools and infrastructure to conduct attacks on dozens of countries, security officials in the UK and USA have revealed.

Advisories published by the UK’s National Cyber Security Centre (NCSC) and US National Security Agency (NSA) have shown that the group targeted victims and adopted techniques used by suspected Iran-based hacking groups.

Victims, the majority of whom were based in the Middle East, saw documents extracted from various sectors, including governments.

Turla used implants derived from the suspected Iran-based hacking groups’ previous campaigns, ‘Neuron’ and ‘Nautilus’. In order to acquire these tools and access the infrastructure, Turla also compromised the suspected Iran-based hacking groups themselves.

The attacks against more than 35 countries would appear to the victims to be Iranian in origin, but the NCSC revealed that this was not the case.

Interestingly, in some instances, it appeared that the implant had first been deployed by an IP address associated with an Iranian APT group, and then was later accessed from infrastructure associated with Turla, a suspected Russia-based group, suggesting Turla effectively took control of victims previously compromised by a different actor.

Turla, which is also known as Waterbug or VENOMOUS BEAR, regularly collects information by targeting government, military, technology, energy and commercial organisations.

Paul Chichester, a senior official at Britain’s GCHQ intelligence agency, said the operation shows state-backed hackers are working in a “very crowded space” and developing new attacks and methods to better cover their tracks.

“We want to send a clear message that even when cyber actors seek to mask their identity, our capabilities will ultimately identify them,” said Chichester, who serves as the NCSC’s director of operations.

Tags: Cyber AttackCybersecuritycybercrimeHacking
Previous Post
SK hynix Develops 1Znm 16Gb DDR4 DRAM
Next Post
Malware Samples Logged by VirusTotal Virus Scanner Could Be Used Cyber Attacks

Related Posts

  • MSI has been hacked, be warned about where you download files

  • Hackers gain access to PS5 Debug Menu and show decrypted PS5 firmware files

  • HP Threat Research Shows Attackers Exploiting Zero‐Day Vulnerability Before Enterprises Can Patch

  • EA Gets hacked - 780GB of data and sourcecode stolen

  • European Supercomputers Researching Covid-19 Report Hacking Attacks

  • Texas Courts Faced a Ransomware Attack

  • Intel Confirms "Thunderspy" Risk in Thuerbolt Devices

  • Microsoft Offers You $100,000 If You Can Hack the Linux-based Azure Sphere

Latest News

Kioxia and Dell Technologies First to Deliver High-Density Server with 9.8 PB of Flash Storage
Enterprise & IT

Kioxia and Dell Technologies First to Deliver High-Density Server with 9.8 PB of Flash Storage

ASUS Republic of Gamers Announces ROG NUC 16
Enterprise & IT

ASUS Republic of Gamers Announces ROG NUC 16

Silicon Power Launches CreatePro Series
Enterprise & IT

Silicon Power Launches CreatePro Series

Newtro Cooling Series and  Next-Gen LCD Coolers at Computex 2026
Cooling Systems

Newtro Cooling Series and Next-Gen LCD Coolers at Computex 2026

Sony Announces the Launch of Xperia 1 VIII
Smartphones

Sony Announces the Launch of Xperia 1 VIII

Popular Reviews

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Soft2bet and the unseen hardware that makes instant play possible

Soft2bet and the unseen hardware that makes instant play possible

Endorfy Thock V2 Wireless Keyboard

Endorfy Thock V2 Wireless Keyboard

Crucial T710 2TB NVME SSD

Crucial T710 2TB NVME SSD

JSAUX 65Wh Rog Ally Battery

JSAUX 65Wh Rog Ally Battery

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed