A new report by security researchers revealed that Russian hackers had been piggybacking on the infections of other hackers to gain access to sensitive data.
Agent.btz, a dangerous piece of malware that infected USB devices put in by unwary Pentagon employees and spread throughout US Department of Defense systems, was created by the Russian cyberespionage group Turla, which gained notoriety in 2008.
After 15 years, the same organisation is attempting a new variation on that tactic: using other hackers’ USB infections as a jumping-off point to piggyback on other infections and covertly select their spying targets.
John Hultquist, who oversees intelligence analysis at Mandiant, said it demonstrates how the Russian group’s techniques have advanced and gotten significantly more sophisticated over the previous 15 years.
“Because the malware already proliferated through USB, Turla can leverage that without exposing themselves. Rather than use their own USB tools like agent.btz, they can sit on someone else’s,” Hultquist said.
“They’re piggybacking on other people’s operations. It’s a really clever way of doing business,” he added.
Last week, cybersecurity company Mandiant disclosed that it had discovered a case in which Turla’s hackers—widely believed to work for Russia’s FSB intelligence agency—allegedly gained access to victim networks by registering the expired domains of nearly ten-year-old cybercriminal malware that was disseminated via infected USB drives.
That hijacking method seems to be intended to allow Turla to operate undetected while snooping across many networks and disguising itself inside the tracks of other hackers.
After Russia’s disastrous invasion of Ukraine last February, the country has become a key target for all Kremlin intelligence services, which is how Mandiant first learned about Turla’s novel method.
The tactics employed by Turla highlight the advanced capabilities available to state-sponsored hackers and their willingness to use any means necessary to gain access to their desired targets.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...