Monday, November 25, 2024
HomeCyber AttackSolarWinds Hack - Multiple Similarities Found Between Sunburst Backdoor and Turla’s Backdoor

SolarWinds Hack – Multiple Similarities Found Between Sunburst Backdoor and Turla’s Backdoor

Published on

Over the past few weeks FireEye, Microsoft, SolarWinds and several US government departments have been subject to attack by the “Sunburst” malware injected via the infected SolarWinds Orion software.

Similarities have been found by Kaspersky between the Sunburst backdoor and Kazuar, a .NET backdoor reportedly linked to the Russian Turla hacking group. Over the course of the investigation the FBI, CISA, and the NSA also suspected that the SolarWinds attacks too had Russian links.

Turla also goes by the names Venemous Bear and Waterbug. Turla specializes in coordinating information theft and espionage campaigns and has a track record going back as far as 1996.

- Advertisement - SIEM as a Service

They have been enlisted as the main suspects behind the attacks targeting the Pentagon and NASA. And The U.S. Central Command.

The algorithm used to generate victim UIDs, the extensive usage of the FNV-1a hash and the sleeping algorithm of both the backdoors are some of the major similarities found between Kazuar and Sunburst.

Despite these similarities, the extent of the similarities and nature of the relationship is still unclear.

Some of the explanations for these similarities highlighted by Kaspersky’s report include:

  • Sunburst was developed by the same group as Kazuar
  • The Sunburst developers adopted some ideas or code from Kazuar, without having a direct connection (they used Kazuar as an inspiration point)
  • Both groups, DarkHalo/UNC2452 and the group using Kazuar, obtained their malware from the same source
  • Some of the Kazuar developers moved to another team, taking knowledge and tools with them
  • The Sunburst developers introduced these subtle links as a form of false flag, in order to shift blame to another group

Kaspersky researchers feel that a coincidence or two would not be too surprising, however, when there are three such coincidences it is definitely quite suspicious.

Having said that, researchers at Kaspersky have not ruled out the possibility that these could be planted to misdirect the investigation. Further technical details can be found in the detailed report published by Kaspersky.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...