Saturday, October 12, 2024
HomeCyber AttackTinyTurla Evolved TTPs To Stealthly Attack Enterprise Organizations

TinyTurla Evolved TTPs To Stealthly Attack Enterprise Organizations

Published on

Malware protection

Staying ahead of security measures and exploiting new vulnerabilities requires hackers to change their tactics.

By doing so, they manage to bypass better defenses, maximize success rates, and keep on with their illegal activities. 

The adaptation of techniques by hackers enables them to continue compromising systems by targeting emerging technologies and adjusting to changes in the digital landscape, which ensures the persistence of their relevance and effectiveness.

- Advertisement - SIEM as a Service

Cybersecurity researchers at Cisco Talos recently discovered that TinyTurla evolved their TTPs to stealthily attack enterprise organizations.

TinyTurla Evolved Their TTPs

Cisco Talo in coordination with CERT.NGO has uncovered new details on the entire kill chain used by the Russian espionage group Turla in an ongoing campaign deploying their TinyTurla-NG (TTNG) implant.

Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.:

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, that helps you to quantify risk accurately:

The analysis reveals Turla compromised multiple systems within a European NGO’s network, establishing persistence, disabling anti-virus protections, and using Chisel for data exfiltration and lateral movement to other accessible hosts after the initial breach. 

The updated findings provide insights into the tactics, techniques, and procedures employed by this threat actor to steal sensitive information and propagate through infected enterprises.

Turla, a threat group, employs advanced tactics. It configures anti-virus exclusions before deploying the TinyTurla-NG backdoor.

Post-deployment establishes persistence via malicious service. Turla adds exclusions in anti-virus software like Microsoft Defender at locations hosting implants. 

Batch file contents (Source – Cisco Talos)

It uses batch files creating “sdm” service masquerading as “System Device Manager” for TinyTurla-NG persistence, mirroring 2021 TinyTurla technique. The dual batch file usage seems unnecessarily convoluted for evasion.

Chisel uses asymmetric encryption in an attacker-controlled system to set up a reverse proxy tunnel.

Attackers leverage this initial chisel connection to pivot laterally via WinRM remote sessions, likely facilitated by proxy chains and evil-winrm. 

Turla tactics, tools and procedures flow (Source – Cisco Talos)

On newly compromised systems, they repeat the cycle – configuring Microsoft Defender exclusions, dropping malware components, and establishing persistence. This adheres to Turla’s methodical cyber kill chain playbook.

Cyber kill chain (Source – Cisco Talos)

Traffic analysis showed Chisel beaconed its C2 server hourly. Though systems were compromised in October 2023 and Chisel deployed by December 2023, Turla operators primarily exfiltrated data over the Chisel C2 channel much later on January 12, 2024.

IOCS

Hashes

  • 267071df79927abd1e57f57106924dd8a68e1c4ed74e7b69403cdcdf6e6a453b
  • d6ac21a409f35a80ba9ccfe58ae1ae32883e44ecc724e4ae8289e7465ab2cf40
  • ad4d196b3d85d982343f32d52bffc6ebfeec7bf30553fa441fd7c3ae495075fc
  • 13c017cb706ef869c061078048e550dba1613c0f2e8f2e409d97a1c0d9949346
  • b376a3a6bae73840e70b2fa3df99d881def9250b42b6b8b0458d0445ddfbc044 

Domains

  • hanagram[.]jpthefinetreats[.]com
  • caduff-sa[.]chjeepcarlease[.]com
  • buy-new-car[.]com
  • carleasingguru[.]com

IP Addresses

  • 91[.]193[.]18[.]120

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability...