{"id":15098,"date":"2015-09-09T13:03:31","date_gmt":"2015-09-09T13:03:31","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4515"},"modified":"2020-02-26T11:02:53","modified_gmt":"2020-02-26T16:02:53","slug":"satellite-turla","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/satellite-turla\/15098\/","title":{"rendered":"Satellite Turla: still alive and hiding in the sky"},"content":{"rendered":"<p>Law enforcement agencies, with the help of leading IT security providers, are keen on blocking all the malware Command &amp; Control servers they find. Sometimes, they efficiently shut down massive botnets by putting their controlling structure out of business. But one of the most advanced threat actors is still out there.<\/p>\n<p>One of the reasons for Turla\u2019s success, besides the group\u2019s obvious professionalism, is their ability to hide the ends \u2013 namely, the above-mentioned C&amp;Cs. <a href=\"https:\/\/securelist.com\/satellite-turla-apt-command-and-control-in-the-sky\/72081\/\" target=\"_blank\" rel=\"noopener\">Research<\/a> by Kaspersky Lab experts reveals \u00a0that they\u2019re achieving this using a trick known as satlink hijacking \u2013 a technique this Russian-speaking group has been using since 2007. \u00a0It involves exploiting the vulnerability of asynchronous satellite internet connections to sniff traffic, distilling the IP addresses of satellite subscribers. All the attackers need then is to set up their servers with the same IPs, configure these addresses into their malware and, after a successful infection, wait for its call for C&amp;C.<\/p>\n<p>What happens next: the satellite broadcasts the request from an infected machine over the whole area of its coverage. Of course, both attackers and law-abiding subscribers receive this request. But, unlike the attackers\u2019 servers, subscriber systems are extremely unlikely to host any services on particular ports \u2013 and this traffic is simply dropped without acknowledgement, as this would increase the burden on the thin cellular upstream channel used in such asynchronous data links. After receiving the malware call, the C&amp;C answers via regular fast landline with a spoofed acknowledgement, which appears to be coming from the same hapless satlink subscriber.<\/p>\n<p>This isn\u2019t the only trick in Turla\u2019s arsenal \u2013 there are other mechanisms potential victims should be more worried about. For initial penetration, they use several different methods, including extremely precise waterholing tactics (infecting only victims with IPs hackers are interested in), exploiting several vulnerabilities in visitors\u2019 systems. It\u2019s worth mentioning that well-known vulnerabilities were actively used, along with zero days, once again proving that automated vulnerability assessment and patch management tools such as those offered by Kaspersky Lab<sup><a href=\"#_ftn1\" name=\"_ftnref1\" target=\"_blank\" rel=\"noopener\">[1]<\/a><\/sup> are essential. In the meantime, another security layer found in <a href=\"https:\/\/www.kaspersky.com\/business-security\/small-to-medium-business\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> \u2013 Automatic Exploit Prevention<sup><a href=\"#_ftn2\" name=\"_ftnref2\" target=\"_blank\" rel=\"noopener\">[2]<\/a><\/sup> \u2013 can block exploits, stopping the attack\u2019s development at the very beginning.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/Du3rBVZqKkk?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>Among the other known scenarios used by Turla attackers: spear-phishing emails with Adobe PDF exploits and even fake Flash player or Microsoft Security Essentials installer that are offered for launch with all the persuasiveness of social engineering.<\/p>\n<p>Turla is, unfortunately, just one of many powerful threat actors out there. All use multiple attack techniques, underlining the critical need for true multi-layered security. This not only includes effective endpoint protection (which should include proactive layers such as behavioral mechanisms or Application Control) but also security for other elements of IT infrastructure. Mail security is of particular importance due to the widely used practice of spear-phishing.<\/p>\n<p>In addition, Kaspersky Lab\u2019s <a href=\"https:\/\/www.kaspersky.com\/enterprise-it-security\/security-intelligence-services\/\" target=\"_blank\" rel=\"noopener nofollow\">Intelligence Services<\/a> may be worth particular consideration. \u00a0The Data Feeds service provides SIEMs and security solutions with knowledge about watering holes or C&amp;C servers, which, in accordance with Turla specifics, may prove especially useful. And because thehuman factor is the most exploited vulnerability ever, different levels of Cybersecurity Training for regular employees as well as IT staff is worth considering.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/GN7KmahVucE?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>Make no mistake: though Turla\u2019s targets are mostly government, military, research and pharmaceutical organizations , your enterprise could still be attacked. Your business contacts with any of these could, in Turla\u2019s eyes, make your IT network a stepping stone for attacking the juicier target. You therefore need a comprehensive strategy \u2013 and if you are keen on implementing one, the Kaspersky Enterprise Portfolio of products and services could be the answer.<\/p>\n<p>The components of Turla\u2019s toolset are detected by Kaspersky Lab\u2019s solutions under the following verdicts:<\/p>\n<ul>\n<li>Backdoor.Win32.Turla.cd<\/li>\n<li>Backdoor.Win32.Turla.ce<\/li>\n<li>Backdoor.Win32.Turla.cl<\/li>\n<li>Backdoor.Win32.Turla.ch<\/li>\n<li>Backdoor.Win32.Turla.cj<\/li>\n<li>Backdoor.Win32.Turla.ck<\/li>\n<li>Trojan.Win32.Agent.dne<\/li>\n<\/ul>\n<p><em><a href=\"#_ftnref1\" name=\"_ftn1\" target=\"_blank\" rel=\"noopener\">[1]<\/a> Vulnerability Assessment and Patch Management are included in <a href=\"https:\/\/www.kaspersky.com\/business-security\/total\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Total Security for Business<\/a>, <a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-advanced\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business Advanced<\/a> and <a href=\"https:\/\/www.kaspersky.com\/business-security\/systems-management\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Systems Management<\/a>.<\/em><\/p>\n<p><em><a href=\"#_ftnref2\" name=\"_ftn2\" target=\"_blank\" rel=\"noopener\">[2]<\/a> Automatic Exploit Prevention technology is available in all tiers of <a href=\"https:\/\/www.kaspersky.com\/business-security\/small-to-medium-business\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> and in <a href=\"https:\/\/www.kaspersky.com\/business-security\/virtualization\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Virtualization | Light Agent<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Law enforcement agencies, with the help of leading IT security providers, are keen on blocking all the malware Command &amp; Control servers they find. Sometimes, they efficiently shut down massive<\/p>\n","protected":false},"author":610,"featured_media":15574,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[499,1237],"class_list":{"0":"post-15098","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-turla"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/satellite-turla\/15098\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/satellite-turla\/15006\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/satellite-turla\/15098\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/satellite-turla\/15098\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/610"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15098"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15098\/revisions"}],"predecessor-version":[{"id":33559,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15098\/revisions\/33559"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15574"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}