{"id":35173,"date":"2020-05-26T14:28:31","date_gmt":"2020-05-26T14:28:31","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31237\/Turla-Hacker-Group-Steals-AV-Logs-To-See-If-Its-Malware-Was-Detected.html"},"modified":"2020-05-26T14:28:31","modified_gmt":"2020-05-26T14:28:31","slug":"turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/","title":{"rendered":"Turla Hacker Group Steals AV Logs To See If Its Malware Was Detected"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/05\/26\/42726986-842a-4ad2-b22e-920bae7afb0d\/turla.jpg\" class alt=\"Turla\"><\/span><\/p>\n<div class=\"relatedContent alignRight\" readability=\"8.0321285140562\">\n<h3 class=\"heading\"><span class=\"int\">Special feature<\/span><\/h3>\n<div class=\"thumb\"><a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\"><span class=\"img\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2016\/09\/01\/fa215859-76c8-4ab7-8b55-56a42e0d8950\/resize\/220x165\/cf651a47272fd8abf79b87f4b45ba3c4\/09-2016-special-feature-cover-art.jpg\" class alt=\"Cyberwar and the Future of Cybersecurity\" height=\"165\" width=\"220\"><\/span><\/a><\/div>\n<p class=\"title\"><a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\">Cyberwar and the Future of Cybersecurity<\/a><\/p>\n<p class=\"dek\">Today&#8217;s security threats have expanded in scope and seriousness. There can now be millions &#8212; or even billions &#8212; of dollars at risk when information security isn&#8217;t handled properly.<\/p>\n<p class=\"read-more\"><a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\">Read More<\/a><\/p>\n<\/div>\n<p>Security researchers from ESET have discovered new attacks carried out by <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/actor\/turla_group\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Turla<\/a>, one of Russia&#8217;s most advanced state-sponsored hacking groups.<\/p>\n<p>The new attacks have taken place in January 2020. ESET researchers say the attacks targeted three high-profile entities, such as a national parliament in the Caucasus and two Ministries of Foreign Affairs in Eastern Europe. Targets could not be identified by name due to national security reasons.<\/p>\n<p>These intrusions represent the latest entries in a long list of victims, most of which include diplomatic and military entities. This list started in the mid-2000s with the Pentagon and has continued throughout the years with targets in Europe, the Middle East, Asia, and Africa.<\/p>\n<p>The January 2020 attacks, however, stood out due to the deployment of an updated version of the ComRAT malware, which ESET says contained some pretty clever new features.<\/p>\n<h3>Turla now steals antivirus logs<\/h3>\n<p>The <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.agent_btz\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">ComRAT malware<\/a>, also known as Agent.BTZ, is one of Turla&#8217;s oldest weapons, and the one they <a href=\"http:\/\/blog.threatexpert.com\/2008\/11\/agentbtz-threat-that-hit-pentagon.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">used to siphon data from the Pentagon&#8217;s network in 2008<\/a>.<\/p>\n<p>The tool has seen several updates across the years, with new versions discovered in <a href=\"https:\/\/securelist.com\/agent-btz-a-source-of-inspiration\/58551\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">2014<\/a> and <a href=\"https:\/\/www.intezer.com\/blog\/research\/new-variants-of-agent-btz-comrat-found\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">2017<\/a>, respectively.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/turla-hacker-group-steals-antivirus-logs-to-see-if-its-malware-was-detected\/\" class=\"lazy\" alt=\"comrat-timeline.png\" data-original=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/05\/26\/198e8e83-c948-4fff-8a8c-d5debba72267\/comrat-timeline.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/05\/26\/198e8e83-c948-4fff-8a8c-d5debba72267\/comrat-timeline.png\" class alt=\"comrat-timeline.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ESET<\/span><\/p>\n<p>The latest version, known as ComRAT v4, was first seen in 2017, however, in a report published today, ESET says they&#8217;ve spotted a variation of ComRAT v4 that includes two new features, such as the ability to exfiltrate antivirus logs and the ability to control the malware using a Gmail inbox.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The first of these features is the malware&#8217;s ability to collect antivirus logs from an infected host and upload it to one of its command and control servers.<\/p>\n<p>The exact motives of a hacker group will always remain unclear, but Matthieu Faou, the ESET researcher who analyzed the malware, told <em>ZDNet<\/em> that Turla operators might be collecting antivirus logs to &#8220;allow them to better understand if and which one of their malware sample was detected.&#8221;<\/p>\n<p>The belief is that if Turla operators see a detection, they can then tweak their malware and avoid future detections on other systems, where they can then operate undetected.<\/p>\n<p>Faou says that malware that steals logs is common, but it&#8217;s always hard for incident responders to detect the behavior.<\/p>\n<p>&#8220;The thing is that it is generally hard to determine what files were exfiltrated by the attackers,&#8221; Faou told us. &#8220;But for relatively advanced groups, it is not uncommon to try to understand if they are detected or if they leave traces behind them or not.&#8221;<\/p>\n<h3>Turla&#8217;s ComRAT uses Gmail as a C&amp;C server<\/h3>\n<p>But this wasn&#8217;t the only major change in the latest ComRAT malware version. Faou says that the malware now includes not one, but two command-and-control mechanisms.<\/p>\n<p>The first is the classic method of contacting a remote server via HTTP and retrieving instructions to execute on infected hosts.<\/p>\n<p>The second, and the new one, is the use of Gmail&#8217;s web interface. Faou says that the latest ComRAT v4 takes over one of the victim&#8217;s browsers, loads a predefined cookie file, and then initiates a session to the Gmail web dashboard.<\/p>\n<p>Here, the malware reads recent emails in the inbox, from where it downloads file attachments, and then reads the instructions contained within the file.<\/p>\n<p>The idea is that whenever Turla operators want to issue new commands to ComRAT instances running on infected hosts, the hackers merely have to send an email to the Gmail address. All data collected following the execution of instructions sent this way is sent back to the Gmail inbox, and redirected back to Turla operators.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/turla-hacker-group-steals-antivirus-logs-to-see-if-its-malware-was-detected\/\" class=\"lazy\" alt=\"comrat-gmail.png\" data-original=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/26\/d915828d-a8cb-4e5b-a60f-ab29d1bbb767\/comrat-gmail.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/26\/d915828d-a8cb-4e5b-a60f-ab29d1bbb767\/comrat-gmail.png\" class alt=\"comrat-gmail.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ESET<\/span><\/p>\n<p>ESET says that despite the new features, Turla operators continue to use ComRAT as they did before, which is primarily as a second-stage payload on already infected hosts. Here, ComRAT is used to search the filesystem for specific files, and then exfiltrate the data to a remote point, usually a cloud file sharing account on OneDrive or 4shared.<\/p>\n<p>Additional details on the new ComRAT malware are available in ESET&#8217;s report, <a href=\"https:\/\/www.welivesecurity.com\/2020\/05\/26\/agentbtz-comratv4-ten-year-journey\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">here<\/a>.<\/p>\n<p>Two weeks ago, Kaspersky also published a report on some older Turla malware that received a nifty update. Researchers said they spotted a new version of the COMpfun malware, which Turla operators could control using a novel and never-before-seen system <a href=\"https:\/\/www.zdnet.com\/article\/russian-hacker-group-using-http-status-codes-to-control-malware-implants\/\" target=\"_blank\" rel=\"noopener noreferrer\">that relied on HTTP status codes<\/a>.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/turla-hacker-group-steals-antivirus-logs-to-see-if-its-malware-was-detected\/\" class=\"lazy\" alt=\"Turla ComRAT\" data-original=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/05\/26\/4978c69b-d224-4088-a1c0-ae1d9e7b3302\/turla-comrat.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/05\/26\/4978c69b-d224-4088-a1c0-ae1d9e7b3302\/turla-comrat.png\" class alt=\"Turla ComRAT\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ESET<\/span> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31237\/Turla-Hacker-Group-Steals-AV-Logs-To-See-If-Its-Malware-Was-Detected.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35174,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8671],"class_list":["post-35173","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermalwarespyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Turla Hacker Group Steals AV Logs To See If Its Malware Was Detected 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Turla Hacker Group Steals AV Logs To See If Its Malware Was Detected 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-26T14:28:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Turla Hacker Group Steals AV Logs To See If Its Malware Was Detected\",\"datePublished\":\"2020-05-26T14:28:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\\\/\"},\"wordCount\":776,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected.jpg\",\"keywords\":[\"headline,hacker,malware,spyware\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\\\/\",\"name\":\"Turla Hacker Group Steals AV Logs To See If Its Malware Was Detected 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected.jpg\",\"datePublished\":\"2020-05-26T14:28:31+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected.jpg\",\"width\":1000,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,malware,spyware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermalwarespyware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Turla Hacker Group Steals AV Logs To See If Its Malware Was Detected\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Turla Hacker Group Steals AV Logs To See If Its Malware Was Detected 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/","og_locale":"en_US","og_type":"article","og_title":"Turla Hacker Group Steals AV Logs To See If Its Malware Was Detected 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-26T14:28:31+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Turla Hacker Group Steals AV Logs To See If Its Malware Was Detected","datePublished":"2020-05-26T14:28:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/"},"wordCount":776,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected.jpg","keywords":["headline,hacker,malware,spyware"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/","url":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/","name":"Turla Hacker Group Steals AV Logs To See If Its Malware Was Detected 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected.jpg","datePublished":"2020-05-26T14:28:31+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected.jpg","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/turla-hacker-group-steals-av-logs-to-see-if-its-malware-was-detected\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,malware,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwarespyware\/"},{"@type":"ListItem","position":3,"name":"Turla Hacker Group Steals AV Logs To See If Its Malware Was Detected"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35173"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35173\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35174"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}