September 25, 2018 By David Bisson 2 min read

Researchers determined that the victims of a backdoor developed by the advanced persistent threat (APT) group Turla are more numerous than originally expected.

The threat group recently employed the backdoor to access the foreign offices of two European countries and a major defense contractor, according to Slovakian IT security company ESET. Those victims received less publicity than Germany’s Federal Foreign Office, which the group breached after compromising the network of the country’s Federal College of Public Administration.

The most recent versions of Turla’s invention went after targets’ inboxes by subverting Microsoft Office’s Messaging Application Programming Interface (MAPI). They were fully controllable by email and didn’t rely on a conventional command-and-control (C&C) server. Instead, the backdoors used specially crafted PDF files in email attachments to fulfill a series of commands such as data exfiltration. The most recent variant from April 2018 was also capable of executing PowerShell commands by leveraging Empire PSInject.

Turla’s Threat Innovation Continues

In 2017, ESET observed Turla leveraging another backdoor called Gazer to target embassies and government organizations around the world. A year later, researchers found evidence that the threat group was bundling the backdoors with a legitimate Adobe Flash Player installer and using URLs and IP addresses that appeared identical to Adobe’s actual infrastructure.

Given ESET’s most recent findings, Turla is showing no signs of slowing down its efforts to spy on promising targets and secretly infect networks with malware for as long as possible.

How to Block an Email-Borne Backdoor

To defend against this and other backdoor threats, security teams should monitor for the indicators of compromise (IoCs) listed in the IBM X-Force Exchange threat advisory. Security experts also recommend following the National Institute of Standards and Technology’s (NIST) cybersecurity framework and conducting security awareness training to educate employees about email-based threats.

Sources: ESET, ESET(1), ESET(2)

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today