• contact@globalcase.org
  • +995322476006
ქართული
  • About UsAbout Us
    • About CASEAbout CASE
    • Our teamour-team
    • CASE AnalyticsCASE Analytics
    • CASE NetworkingCASE Networking
    • Careercareer
    • Certificationcertification
    • Cyber Security in CASECyber Security in CASE
    • Success StoriesSuccess Stories
    • Contact UsGet in touch
  • Blog
  • ServicesServices
    • Personal Data ProtectionPersonal Data Protection Service and DPO Outsourcing
    • Cyber Security ServicesCyber Security Services
    • Corporate TrainingsCorporate Trainings
  • HomeLets start here
  • Mediamedia
    • Media about usMedia about us
    • News
  • CoursesCourses
  • Resources
    • Cyber PodcastCyber Podcast
    • Research and Analysis
    • E-Books
    • Students Work
    • Security Brief
    • Frequently asked QuestionsFrequently asked Questions
logo
CASE

Email Address

contact@globalcase.org

Phone

+995322476006
  • About UsAbout Us
    • About CASEAbout CASE
    • Our teamour-team
    • CASE AnalyticsCASE Analytics
    • CASE NetworkingCASE Networking
    • Careercareer
    • Certificationcertification
    • Cyber Security in CASECyber Security in CASE
    • Success StoriesSuccess Stories
    • Contact UsGet in touch
  • Blog
  • ServicesServices
    • Personal Data ProtectionPersonal Data Protection Service and DPO Outsourcing
    • Cyber Security ServicesCyber Security Services
    • Corporate TrainingsCorporate Trainings
  • HomeLets start here
  • Mediamedia
    • Media about usMedia about us
    • News
  • CoursesCourses
  • Resources
    • Cyber PodcastCyber Podcast
    • Research and Analysis
    • E-Books
    • Students Work
    • Security Brief
    • Frequently asked QuestionsFrequently asked Questions

Security Brief

    HomeSecurity Brief
    Russian Hackers Actively Targeting European NGO’s Systems
Russian Hackers Actively Targeting European NGO’s Systems
Russian Hackers Actively Targeting European NGO’s Systems
In:
Updates
Created:
22 Mar 2024
Share :

Turla, a threat actor with ties to Russia, compromised multiple systems of an unidentified European non-governmental organization with the intention of installing a backdoor known as TinyTurla-NG (TTNG).

In a new study released today, Cisco Talos stated that "as part of their preliminary post-compromise actions, the attackers compromised the first system, established persistence, and added exclusions to antivirus products running on these endpoints."

"Turla then opened additional channels of communication via Chisel for data exfiltration and to pivot to additional accessible systems in the network."

TinyTurla-NG was first documented by the cybersecurity company last month after it was found to be used in connection with a cyber attack targeting a Polish NGO working on improving Polish democracy and supporting Ukraine during the Russian invasion.

Utilizing TinyTurla-NG as a backdoor allows for the execution of custom-built Chisel tunneling software, follow-up reconnaissance, and the exfiltration of files of interest to a command-and-control (C2) server.

"Once the attackers have gained access to a new box, they will repeat their activities to create Microsoft Defender exclusions, drop the malware components, and create persistence," researchers from Talos warned.

Source: The Hacker News

In:
Updates

Search Date

Categories

  • Breaking News
  • Updates
  • Thoughts
  • footer_logo

    Advancing Security as a Profession!

    Join Newsletter

    Services

    • Cyber and Information Security
    • Bank Security officer course
    • Work safety services
    • Fire safety training
    • First aid training

    Links

    • FAQ
    • Services
    • Courses
    • Privacy Policy
    • Terms

    Contact

    • +995 322 476 006
    • contact@globalcase.org
    • Georgia, Tbilisi, Pekini Ave. 30
    • Homepage
    • Main competence
    • Services
    • Courses
    • Blog
    • Contact us