{"id":34982,"date":"2020-05-14T20:45:47","date_gmt":"2020-05-14T20:45:47","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31210\/Russian-Hacker-Groups-Using-HTTP-Status-Codes-To-Control-Malware.html"},"modified":"2020-05-14T20:45:47","modified_gmt":"2020-05-14T20:45:47","slug":"russian-hacker-groups-using-http-status-codes-to-control-malware","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/","title":{"rendered":"Russian Hacker Groups Using HTTP Status Codes To Control Malware"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/14\/a9d233d3-94b8-4a00-99e6-02e3a374457c\/vulnerability-code.png\" class alt=\"vulnerability-code.png\"><\/span><\/p>\n<div class=\"relatedContent alignRight\" readability=\"8.0321285140562\">\n<h3 class=\"heading\"><span class=\"int\">Special feature<\/span><\/h3>\n<div class=\"thumb\"><a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\"><span class=\"img\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2016\/09\/01\/fa215859-76c8-4ab7-8b55-56a42e0d8950\/resize\/220x165\/cf651a47272fd8abf79b87f4b45ba3c4\/09-2016-special-feature-cover-art.jpg\" class alt=\"Cyberwar and the Future of Cybersecurity\" height=\"165\" width=\"220\"><\/span><\/a><\/div>\n<p class=\"title\"><a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\">Cyberwar and the Future of Cybersecurity<\/a><\/p>\n<p class=\"dek\">Today&#8217;s security threats have expanded in scope and seriousness. There can now be millions &#8212; or even billions &#8212; of dollars at risk when information security isn&#8217;t handled properly.<\/p>\n<p class=\"read-more\"><a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\">Read More<\/a><\/p>\n<\/div>\n<p>Security researchers from Kaspersky have identified a new version of the COMpfun malware that controls infected hosts using a mechanism that relies on HTTP status codes.<\/p>\n<p>The malware has been first spotted last year, in November, and has been deployed in attacks against diplomatic entities across Europe.<\/p>\n<p>Responsible for the attacks is a group known as Turla, a state-sponsored Russian threat actor that has historically engaged in cyber-espionage operations.<\/p>\n<p><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/actor\/turla_group\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Turla<\/a> has a long history of using non-standard and innovative methods to build malware and carry out stealthy attacks.<\/p>\n<p>The group has been known to <a href=\"https:\/\/securelist.com\/satellite-turla-apt-command-and-control-in-the-sky\/72081\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">hijack and use telecommunications satellites<\/a> to deliver malware to remote areas of the globe, has developed malware that hid its control mechanism <a href=\"https:\/\/www.welivesecurity.com\/2017\/06\/06\/turlas-watering-hole-campaign-updated-firefox-extension-abusing-instagram\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">inside comments posted on Britney Spears&#8217; Instagram photos<\/a>, has developed <a href=\"https:\/\/www.zdnet.com\/article\/russian-cyberspies-are-using-one-hell-of-a-clever-microsoft-exchange-backdoor\/\" target=\"_blank\" rel=\"noopener noreferrer\">email server backdoors that received commands via spam-looking messages<\/a>, has <a href=\"https:\/\/www.zdnet.com\/article\/russian-apt-hacked-iranian-apts-infrastructure-back-in-2017\/\" target=\"_blank\" rel=\"noopener noreferrer\">hacked other countries&#8217; cyber-espionage hacker groups<\/a>, and has been <a href=\"https:\/\/www.zdnet.com\/article\/russian-hacker-group-patches-chrome-and-firefox-to-fingerprint-tls-traffic\/\" target=\"_blank\" rel=\"noopener noreferrer\">modifying Chrome and Firefox installations<\/a> on victim devices in order to hide a small fingerprint in HTTPS traffic that they later use to track the victim&#8217;s traffic across the internet backbone.<\/p>\n<p>In a report published today, Kaspersky has revealed another of Turla&#8217;s novel techniques &#8212; namely malware that receives instructions from command and control (C&amp;C) servers in the form of HTTP status codes.<\/p>\n<h3>New COMpfun version<\/h3>\n<p>This particular malware is named COMpfun, and is a classic remote access trojan (RAT) that infects victims and then collects system data, logs keystrokes, and takes screenshots of the user&#8217;s desktop. All collected data is exfiltrated to a remote C&amp;C server.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The first COMpfun version was seen in the wild in 2014, and detailed in a G DATA report <a href=\"https:\/\/www.gdatasoftware.com\/blog\/2014\/10\/23941-com-object-hijacking-the-discreet-way-of-persistence\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">here<\/a>. Today, Kaspersky says that they spotted a new COMpfun version last year.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/russian-hacker-group-using-http-status-codes-to-control-malware-implants\/\" class=\"lazy\" alt=\"compfun.jpg\" data-original=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/05\/14\/d551747c-1316-42bf-b268-68a4b7ba936c\/compfun.jpg\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/05\/14\/d551747c-1316-42bf-b268-68a4b7ba936c\/compfun.jpg\" class alt=\"compfun.jpg\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Kaspersky<\/span><\/p>\n<p>This new upgraded version was different from the older COMpfun iterations. Besides the classic RAT-like data collection features, Kaspersky says the new COMpfun version also included two new additions.<\/p>\n<p>The first was its ability to monitor when USB removable devices are connected to an infected host, and then propagate itself to the new device. The feature is believed to be a self-spreading mechanism used by the Turla group to infect other systems on internal and\/or air-gapped networks.<\/p>\n<h3>New HTTP status code-based C&amp;C protocol<br \/><\/h3>\n<p>The second addition is a new C&amp;C communications system. According to Kaspersky, this new C&amp;C malware protocol doesn&#8217;t use a classic pattern where commands are sent directly to the infected hosts (the COMpfun malware implants) as HTTP or HTTPS requests carrying clearly-defined commands.<\/p>\n<p>Security researchers and security products often scan HTTP\/HTTPS traffic for patterns that look like malware commands. When they see CLI-like parameters in HTTP headers or traffic, it&#8217;s usually an obvious sign there&#8217;s something malicious going on.<\/p>\n<p>To avoid this type of detection, the Turla group developed a new server-client C&amp;C protocol that relies on HTTP status codes.<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_HTTP_status_codes\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">HTTP status codes<\/a> are internationally-standardized responses that a server provides to a connecting client. The status codes provide a state of the server, and they&#8217;re used to tell the client (usually browsers) what to do next &#8212; such as drop the connection, provide credentials, refresh the connection, and so on.<\/p>\n<p>Kaspersky says Turla adapted this basic server-client mechanism that&#8217;s been around for decades to COMpfun&#8217;s C&amp;C protocol, where the COMpfun C&amp;C plays the role of a server, and the COMpfun implants running on infected hosts play the role of clients.<\/p>\n<p>Kaspersky says that every time a COMpfun implant pings the C&amp;C server if the server responds with a 402 (Payment Required) status code, all subsequent status codes are future commands.<\/p>\n<p>For example, if the COMpfun server would respond with a 402 status code, followed by a 200 status code, the malware implant would upload all the data it collected from a host&#8217;s computer to the Turla C&amp;C server.<\/p>\n<p>Researchers say they&#8217;ve been able to reverse engineer the following HTTP status codes and their associated COMpfun commands.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/russian-hacker-group-using-http-status-codes-to-control-malware-implants\/\" class=\"lazy\" alt=\"compfun-commands.png\" data-original=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/14\/02aa20e2-a479-4268-997b-a849b1a939f7\/compfun-commands.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/14\/02aa20e2-a479-4268-997b-a849b1a939f7\/compfun-commands.png\" class alt=\"compfun-commands.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Kaspersky<\/span><\/p>\n<p>The COMpfun report shows once again why Turla is considered one of the most sophisticated cyber-espionage group today.<\/p>\n<p>With a history of targeting diplomatic targets, the group has invested heavily in stealth, something that not many Russian state-hacker groups have done, most of which are very noisy in their operations.<\/p>\n<p><em>Additional details about the COMpfun malware and indicators of compromise are available in the <a href=\"https:\/\/securelist.com\/compfun-http-status-based-trojan\/96874\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Kaspersky report<\/a>.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31210\/Russian-Hacker-Groups-Using-HTTP-Status-Codes-To-Control-Malware.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34983,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[3779],"class_list":["post-34982","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermalwarerussia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Russian Hacker Groups Using HTTP Status Codes To Control Malware 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Russian Hacker Groups Using HTTP Status Codes To Control Malware 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-14T20:45:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/russian-hacker-groups-using-http-status-codes-to-control-malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"863\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-hacker-groups-using-http-status-codes-to-control-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-hacker-groups-using-http-status-codes-to-control-malware\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Russian Hacker Groups Using HTTP Status Codes To Control Malware\",\"datePublished\":\"2020-05-14T20:45:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-hacker-groups-using-http-status-codes-to-control-malware\\\/\"},\"wordCount\":795,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-hacker-groups-using-http-status-codes-to-control-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/russian-hacker-groups-using-http-status-codes-to-control-malware.png\",\"keywords\":[\"headline,hacker,malware,russia\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-hacker-groups-using-http-status-codes-to-control-malware\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-hacker-groups-using-http-status-codes-to-control-malware\\\/\",\"name\":\"Russian Hacker Groups Using HTTP Status Codes To Control Malware 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-hacker-groups-using-http-status-codes-to-control-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-hacker-groups-using-http-status-codes-to-control-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/russian-hacker-groups-using-http-status-codes-to-control-malware.png\",\"datePublished\":\"2020-05-14T20:45:47+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-hacker-groups-using-http-status-codes-to-control-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-hacker-groups-using-http-status-codes-to-control-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-hacker-groups-using-http-status-codes-to-control-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/russian-hacker-groups-using-http-status-codes-to-control-malware.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/russian-hacker-groups-using-http-status-codes-to-control-malware.png\",\"width\":863,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-hacker-groups-using-http-status-codes-to-control-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,malware,russia\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermalwarerussia\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Russian Hacker Groups Using HTTP Status Codes To Control Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Russian Hacker Groups Using HTTP Status Codes To Control Malware 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/","og_locale":"en_US","og_type":"article","og_title":"Russian Hacker Groups Using HTTP Status Codes To Control Malware 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-14T20:45:47+00:00","og_image":[{"width":863,"height":400,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/russian-hacker-groups-using-http-status-codes-to-control-malware.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Russian Hacker Groups Using HTTP Status Codes To Control Malware","datePublished":"2020-05-14T20:45:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/"},"wordCount":795,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/russian-hacker-groups-using-http-status-codes-to-control-malware.png","keywords":["headline,hacker,malware,russia"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/","url":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/","name":"Russian Hacker Groups Using HTTP Status Codes To Control Malware 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/russian-hacker-groups-using-http-status-codes-to-control-malware.png","datePublished":"2020-05-14T20:45:47+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/russian-hacker-groups-using-http-status-codes-to-control-malware.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/russian-hacker-groups-using-http-status-codes-to-control-malware.png","width":863,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/russian-hacker-groups-using-http-status-codes-to-control-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,malware,russia","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwarerussia\/"},{"@type":"ListItem","position":3,"name":"Russian Hacker Groups Using HTTP Status Codes To Control Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34982"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34982\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34983"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}