{"id":14840,"date":"2018-10-05T05:25:08","date_gmt":"2018-10-05T05:25:08","guid":{"rendered":"http:\/\/6b6eb778-b86e-416c-b7e3-b4eea17fcd38"},"modified":"2018-10-05T05:25:08","modified_gmt":"2018-10-05T05:25:08","slug":"russias-elite-hacking-unit-has-been-silent-but-busy","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/","title":{"rendered":"Russia&#8217;s elite hacking unit has been silent, but busy"},"content":{"rendered":"<p>Turla, one of the codenames given by the cyber-security industry to one of Russia&#8217;s oldest and most &#8220;talented&#8221; cyber-espionage unit, has been very active in the past three years, even though their operations have not received the same media coverage of other more flashy Russian hacking outfits.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>According to new research presented yesterday at the Virus Bulletin security conference held in Montreal, Canada, the group has been behind dozens of hacks around the world, operating with revamped malware and a tendency towards runtime scripting and the usage of open source tools.<\/p>\n<p>&#8220;Turla was absent from the milestone DNC hack event where Sofacy [APT28] and CozyDuke [APT29] were both present, but Turla was quietly active around the globe on other projects,&#8221; said Kaspersky&#8217;s GReAT team in a report published shortly after the presentation.<\/p>\n<p>But while APT28 and APT29&#8217;s loudmouth dissemination of the DNC hacked data has led to public inquiries into their <a href=\"https:\/\/www.zdnet.com\/article\/uk-and-australia-blame-russian-gru-for-quartet-of-cyber-attacks\/\" target=\"_blank\">ties to Russian intelligence agencies<\/a> &#8211;which eventually led to several public indictments [<a href=\"https:\/\/www.zdnet.com\/article\/justice-dept-indicts-democratic-national-committee-hackers\/\" target=\"_blank\">1<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/russian-cyber-spies-busted-by-netherlands-left-behind-evidence-of-many-operations\/\" target=\"_blank\">2<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/us-charges-russian-military-officers-over-international-hacking-and-disinformation-campaigns\/\" target=\"_blank\">3<\/a>]&#8211; Turla has remained the same mystery as it always was.<\/p>\n<p>Considered by many to be Russia&#8217;s elite hacking unit, Turla is believed to have ties to Moonlight Maze, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/21-years-later-experts-connect-the-dots-on-one-of-the-first-cyber-espionage-groups\/\" target=\"_blank\" rel=\"noopener noreferrer\">one of the first government-backed hacking operations ever discovered<\/a>, back in the 90s.<\/p>\n<p>The Turla group is infamous for past operations that seem to be pulled out of Hollywood movie scripts. The group has been known to <a href=\"https:\/\/securelist.com\/satellite-turla-apt-command-and-control-in-the-sky\/72081\/\" target=\"_blank\" rel=\"noopener noreferrer\">hijack and use telecommunications satellites<\/a> to deliver malware to remote areas of the globe, has developed malware that hid its control mechanism <a href=\"https:\/\/www.welivesecurity.com\/2017\/06\/06\/turlas-watering-hole-campaign-updated-firefox-extension-abusing-instagram\/\" target=\"_blank\" rel=\"noopener noreferrer\">inside Britney Spears&#8217; Instagram<\/a>, and has <a href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2018\/01\/ESET_Turla_Mosquito.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">hijacked the infrastructure of entire ISPs<\/a> to redirect users to malware.<\/p>\n<p>Turla hacks are rarely covered by news media, but they always go after strategic targets in the interest of the Russian state.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The group is always very careful in their operational security, not to reveal too many hints about its operators, and they&#8217;ve never relied on social media diversionary tactics like the ones used by APT28 &#8212; who created and operated the Guccifer 2.0 hacker persona and the Fancy Bears HT Twitter account in an attempt to manipulate the media and take the blame for hacks, instead of the Russian state.<\/p>\n<p>But while APT28 was busy feeding international media all sorts of Russian propaganda, Turla was occupied hacking government and foreign affairs organizations, universities, news media agencies, and scientific and energy research organizations.<\/p>\n<p>In its recent <a href=\"https:\/\/securelist.com\/shedding-skin-turlas-fresh-faces\/88069\/\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a>, Kasperksy has listed several of the group&#8217;s hacks from the past three years, including a detailed description of its revamped hacking arsenal that includes the Mosquito, New Carbon, IcedCoffee, KopiLuwak, WhiteAtlas, and WhiteBear backdoors.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2018\/10\/05\/5a70256d-4cf1-4f55-8250-8c14d3289996\/6a963731baf4828f6349506ca0c73248\/turla-recent-targeting.png\" class=\"\" alt=\"turla-recent-targeting.png\"\/><\/span> <span class=\"credit\">Image: Kaspersky Lab<\/span><\/p>\n<p>According to the Moscow-based antivirus maker, Turla&#8217;s Carbon and Mosquito operations focused on government and foreign affairs related organizations in Central Asia, while WhiteAtlas and WhiteBear activity also targeted foreign affairs-related organizations, but all over the globe, and not in a specific area.<\/p>\n<p>On the other hand, the Turla operation relying on IcedCoffee, a JavaScript-based backdoor, was not widely deployed and was only used against diplomats, including Ambassadors, of European governments.<\/p>\n<p>KopiLuwak, a similar JavaScript-based backdoor, was used against the same type of targets as IcedCoffee, but even on rarer occasions. Furthermore, in 2018, Kaspersky says this tool was also used against government-related scientific and energy research organizations, and a government-related communications organization in Afghanistan, showing a general shift in Turla operations from diplomatic cyber-espionage to the research sector.<\/p>\n<h3>Related Coverage<\/h3>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/cyber-security-nation-state-cyber-attacks-threaten-everyone-warns-ex-gchq-boss\/\">Cyber security: Nation-state cyber attacks threaten everyone, warns ex-GCHQ boss<\/a><\/strong><\/p>\n<p>Citing Russian cyber attacks and WannaCry, ex-GCHQ director Robert Hannigan says nation-state campaigns have become &#8220;a problem for everybody&#8221;<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/edge-computing-the-cyber-security-risks-you-must-consider\/\">Edge computing: the cyber security risks you must consider<\/a><\/strong><\/p>\n<p>Edge computing could be an innovative new way to collect data, but it also opens up a world of additional security headaches.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/tesco-bank-fined-16-4m-over-cyber-attack\/\">Tesco Bank fined \u00a316.4m over cyber attack<\/a><\/strong><\/p>\n<p>Regulator said the attack which saw hackers steal \u00a32.25m from account holders was &#8216;largely avoidable&#8217;.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/video\/cyber-security-strategy-must-be-a-board-level-issue\/\">Cyber security strategy must be a board-level issue<\/a><\/strong><\/p>\n<p>Hacking and data breaches are an ongoing threat, so why are so many execs ignoring the issue?<\/p>\n<p><strong><a href=\"https:\/\/www.techrepublic.com\/article\/heres-what-happens-during-a-social-engineering-cyber-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Here&#8217;s what happens during a social engineering cyber-attack<\/a><\/strong> (TechRepublic)<\/p>\n<p>BioCatch&#8217;s VP Frances Zelazny explains each step of social engineering hacks, low-tech cyberattacks that have a big impact on business.<\/p>\n<p><strong><a href=\"https:\/\/www.techrepublic.com\/article\/how-weaponized-ai-creates-a-new-breed-of-cyber-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">How weaponized AI creates a new breed of cyber-attacks<\/a><\/strong> (TechRepublic)<\/p>\n<p>IBM security researchers discovered invasive and targeted artificial intelligence-powered cyber-attacks triggered by geolocation and facial recognition.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/russias-elite-hacking-unit-has-been-silent-but-busy\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While APT28 was making fun of the DNC through Western media, Turla APT remained active and hacking in the shadows.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":14841,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-14840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Russia&#039;s elite hacking unit has been silent, but busy 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Russia&#039;s elite hacking unit has been silent, but busy 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-05T05:25:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/russias-elite-hacking-unit-has-been-silent-but-busy.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"877\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russias-elite-hacking-unit-has-been-silent-but-busy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russias-elite-hacking-unit-has-been-silent-but-busy\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Russia&#8217;s elite hacking unit has been silent, but busy\",\"datePublished\":\"2018-10-05T05:25:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russias-elite-hacking-unit-has-been-silent-but-busy\\\/\"},\"wordCount\":748,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russias-elite-hacking-unit-has-been-silent-but-busy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/russias-elite-hacking-unit-has-been-silent-but-busy.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russias-elite-hacking-unit-has-been-silent-but-busy\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russias-elite-hacking-unit-has-been-silent-but-busy\\\/\",\"name\":\"Russia's elite hacking unit has been silent, but busy 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russias-elite-hacking-unit-has-been-silent-but-busy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russias-elite-hacking-unit-has-been-silent-but-busy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/russias-elite-hacking-unit-has-been-silent-but-busy.png\",\"datePublished\":\"2018-10-05T05:25:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russias-elite-hacking-unit-has-been-silent-but-busy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russias-elite-hacking-unit-has-been-silent-but-busy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russias-elite-hacking-unit-has-been-silent-but-busy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/russias-elite-hacking-unit-has-been-silent-but-busy.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/russias-elite-hacking-unit-has-been-silent-but-busy.png\",\"width\":1024,\"height\":877},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russias-elite-hacking-unit-has-been-silent-but-busy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Russia&#8217;s elite hacking unit has been silent, but busy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Russia's elite hacking unit has been silent, but busy 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/","og_locale":"en_US","og_type":"article","og_title":"Russia's elite hacking unit has been silent, but busy 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-05T05:25:08+00:00","og_image":[{"width":1024,"height":877,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/russias-elite-hacking-unit-has-been-silent-but-busy.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Russia&#8217;s elite hacking unit has been silent, but busy","datePublished":"2018-10-05T05:25:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/"},"wordCount":748,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/russias-elite-hacking-unit-has-been-silent-but-busy.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/","url":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/","name":"Russia's elite hacking unit has been silent, but busy 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/russias-elite-hacking-unit-has-been-silent-but-busy.png","datePublished":"2018-10-05T05:25:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/russias-elite-hacking-unit-has-been-silent-but-busy.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/russias-elite-hacking-unit-has-been-silent-but-busy.png","width":1024,"height":877},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/russias-elite-hacking-unit-has-been-silent-but-busy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Russia&#8217;s elite hacking unit has been silent, but busy"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=14840"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14840\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/14841"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=14840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=14840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=14840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}