{"id":53799,"date":"2023-09-22T00:00:00","date_gmt":"2023-09-22T00:00:00","guid":{"rendered":"urn:uuid:45a2a489-0fc1-9490-9f0b-1b4c9c651f41"},"modified":"2023-09-22T00:00:00","modified_gmt":"2023-09-22T00:00:00","slug":"examining-the-activities-of-the-turla-apt-group","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/","title":{"rendered":"Examining the Activities of the Turla APT Group"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/Turla-cover:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/23\/Turla-cover.png\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"51.957486832205\">\n<div readability=\"51.480812641084\">\n<p>Techniques:<\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>While the previous Turla campaigns were designed to target Windows-based machines, the campaign in August 2014&nbsp; was the first instance where Turla targeted the Linux operating system. Dubbed as <a href=\"https:\/\/securelist.com\/the-penquin-turla-2\/67962\/\">Penguin Turla<\/a>, the group used a Linux Turla module with a C\/C++ executable statically linked against multiple libraries, greatly increasing its file size for this campaign.<b><\/b><\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>A group of threat actors named Waterbug (alleged to be a state-sponsored group) used variants of Trojan.Turla and Trojan.Wipbot to exploit a zero-day vulnerability, specifically the Windows Kernel <i>NDProxy.sys<\/i> local privilege escalation vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2013-5065\">CVE-2013-5065<\/a>. A <a href=\"https:\/\/docs.broadcom.com\/doc\/waterbug-attack-group\">research<\/a> entry suggested that the attackers used specially crafted emails with malicious attachments and a set of compromised websites to deliver malicious payloads.<b><\/b><\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>In 2017, ESET published a research entry on a <a href=\"https:\/\/www.welivesecurity.com\/2017\/03\/30\/carbon-paper-peering-turlas-second-stage-backdoor\/\">sophisticated variant of the Turla malware<\/a>, a second-stage backdoor known as Carbon. A Carbon attack initially involves the victim either receiving a spear-phishing email or visiting a compromised website, also known as a watering hole.<\/p>\n<p>This is then followed by the installation of a first-stage backdoor such as Tavdig or Skipper. The second-stage backdoor Carbon is then installed on key systems after renaissance activities are completed. The Carbon framework consists of a dropper to install its configuration file, a component to communicate with the C&amp;C server, an orchestrator to handle tasks and move them laterally over the network, and a loader to execute the orchestrator.<\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>In May 2017, a new backdoor trojan by the name <a href=\"https:\/\/unit42.paloaltonetworks.com\/unit42-kazuar-multiplatform-espionage-backdoor-api-access\/\">Kazuar<\/a> was linked to the Turla group. Written using the Microsoft .NET Framework, Kazuar contains highly functional command sets that are capable of remotely loading additional plug-ins.<\/p>\n<p>Kazuar gathers system and malware file name information and creates a mutex to ensure that only one instance of the malware executes on the system at a time. It then adds an LNK file to the Windows startup folder.<\/p>\n<p>Majority of the commands set in Kazuar share similar attributes with other backdoor Trojans. For example, the <i>tasklist<\/i> command uses a Windows Management Instrumentation (WMI) query to obtain running process from Windows while the <i>info<\/i> command is used to gather information about opened windows. Meanwhile, Kazuar\u2019s <i>cmd<\/i> command will run commands using <i>cmd.exe<\/i> for Windows systems and <i>\/bin\/bash<\/i> for Unix systems. These commands strongly suggests that Kazuar was built to be a cross-platform malware targeting both Windows and Unix systems.<\/p>\n<p>Research <a href=\"https:\/\/securelist.com\/sunburst-backdoor-kazuar\/99981\/\">conducted in early 2021<\/a> revealed several similarities between the Sunburst and Kazuar backdoors.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"34.070052539405\">\n<div readability=\"15.355516637478\">\n<p>Techniques:<\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>In August, Turla unveiled a new second-stage backdoor written in C++ known as <a href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/08\/eset-gazer.pdf\">Gazer<\/a>, which relied on watering-hole attacks and spear-phishing campaigns for more precise targeting of victims.<\/p>\n<p>Aside from being stealthier, Gazer was found to have plenty of similarities with the previously used second-stage backdoors such as Carbon and Kazuar. The defining characteristic of this campaign was the insertion of \u201cvideo-game-relate\u201d sentences throughout the code. Turla encrypts Gazer\u2019s C&amp;C server using its own library for 3DES and RSA.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"44.00244140625\">\n<div readability=\"35.958984375\">\n<p>Techniques:<\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>An intelligence <a href=\"https:\/\/www.ncsc.gov.uk\/news\/turla-group-malware\">report<\/a> from 2018 suggested that Turla used new malicious tools known as Neuron and Nautilus in conjunction with the Snake rootkit to target Windows machines, focusing on mail and web servers in particular. Turla made use of existing Snake victims to scan for ASPX shell, with the commands being passed using encrypted HTTP cookie values. The entry also mentioned that Turla used ASPX shells to gain a foothold into the target system to deploy additional tools.<\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>Turla <a href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2018\/08\/Eset-Turla-Outlook-Backdoor.pdf\">targeted the foreign offices<\/a> of European governments via a backdoor, with the intention of accessing highly sensitive information. The campaign targeted Microsoft Outlook and The Bat! (a popular mail client primarily used in Eastern Europe) by forwarding all outgoing emails to the attackers. The backdoor used email messages to exfiltrate data, employing specially crafted PDF documents. It also used email messages as a transport layer for its C&amp;C server.<\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>OilRig is an <a href=\"https:\/\/www.attackiq.com\/2022\/07\/11\/oilrig-attack-graphs-emulating-the-iranian-threat-actors-global-campaigns\/\">Iran-linked APT group<\/a> that usually targets government agencies and organizations in the Middle East. Previous <a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/waterbug-espionage-governments\">research<\/a> suggests that the Turla group compromised a target using OilRig\u2019s infrastructure. The campaign saw the use of a heavily modified, custom variant of the <a href=\"https:\/\/www.trendmicro.com\/vinfo\/ph\/security\/news\/cybercrime-and-digital-threats\/locked-loaded-and-in-the-wrong-hands-legitimate-tools-weaponized-for-ransomware-in-2021\">Mimikatz tool<\/a>, plus a&nbsp; new set of tools involving several new backdoors. In the later stages of the campaign, Turla group used a different remote procedure call (RPC) backdoor, which included code from the publicly available PowerShell Runner tool to execute PowerShell scripts (without using <i>powershell.exe<\/i>).<b><\/b><\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>In March 2020, <a href=\"https:\/\/www.welivesecurity.com\/2020\/03\/12\/tracking-turla-new-backdoor-armenian-watering-holes\/\">security researchers observed<\/a> Turla targeted multiple Armenian websites using watering-hole attacks. These websites were implanted with malicious JavaScript code, although the access methods used in attack are unknown.<\/p>\n<p>The compromised webpage then delivered the second-stage malicious JavaScript code to fingerprint victim browser and trick them into installing a malicious flash installer. Turla then used NetFlash (a .NET downloader) and PyFlash for its second-stage malware.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"29.67654028436\">\n<div readability=\"12.042654028436\">\n<p>Techniques:<\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p><a href=\"https:\/\/www.welivesecurity.com\/2020\/05\/26\/agentbtz-comratv4-ten-year-journey\/\">ComRAT v4<\/a>, also known as Agent.BTZ, is a remote access trojan (RAT) used by Turla and developed using C++ and employing a virtual FAT16 file system that is often used to exfiltrate sensitive documents. It is deployed using existing access methods, such as the PowerStallion PowerShell backdoor. Furthermore, it uses HTTP and emails as C&amp;C channels.&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"32.604790419162\">\n<div readability=\"17.389221556886\">\n<p>Techniques:<\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>In December 2020, &nbsp;a previously undocumented backdoor and document stealer named Crutch was <a href=\"https:\/\/threatpost.com\/turla-backdoor-dropbox-espionage-attacks\/161777\/\">attributed to the Turla group<\/a>. Apparently, older versions of Crutch included a backdoor that communicated with a hard-coded Dropbox account using the official HTTP API.<\/p>\n<p>It had the ability to execute commands related to the reading and writing of files, executing additional processes, and setting persistence via DLL hijacking on Google Chrome, Mozilla Firefox, or Microsoft OneDrive. One major feature of Crutch v4 is that it can automatically upload the files found on local and removable drives to Dropbox storage by using the Windows version of the Wget utility (unlike the previous versions that relied on the backdoor commands).<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"29.977777777778\">\n<div readability=\"13.511111111111\">\n<p>Techniques:<\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>The new Turla backdoor known as <a href=\"https:\/\/blog.talosintelligence.com\/tinyturla\/\">TinyTurla<\/a> was likely used as a failover option to maintain access to the system even when the primary malware is removed. The backdoor is installed using a batch file and comes in the form of a service DLL called <i>w64time.dll<\/i> that tries to impersonate the legitimate <i>w32time.dll<\/i> file on Windows systems.<\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>Turla\u2019s May 2022 campaign was used for the sole purpose of reconnaissance and did not involve any use of malicious code. Security researchers <a href=\"https:\/\/blog.sekoia.io\/turla-new-phishing-campaign-eastern-europe\/\">discovered a document<\/a> that performed requests via HTTP to its own controlled server, with the purpose of capturing the version and type of Microsoft Word application used by the victim. The information can later be used to craft a specific exploit based on the Microsoft Word version.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"30.127232142857\">\n<div readability=\"10.042410714286\">\n<p>Techniques:<\/p>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<h2><span class=\"body-subhead-title\"><\/span><\/h2>\n<p>A July 2023 <a href=\"https:\/\/cert.gov.ua\/article\/5213167\">announcement<\/a> from the Computer Emergency Response Team of Ukraine (CERT-UA) revealed that Turla was using the Capibar malware and Kazuar backdoor for espionage attacks on Ukrainian defensive assets. In this campaign, Capibar was used for intelligence gathering while Kazuar performed credential theft. This attack targeted diplomatic and military organizations by leveraging phishing attacks.&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"35.833333333333\">\n<div readability=\"19.111111111111\">\n<p>Techniques:<\/p>\n<p>The Turla group is a persistent adversary with a long history of activities. Their origins, tactics, and targets all indicate a well-funded operation with highly skilled operatives. Turla has continuously developed its tools and techniques over years and will likely keep on refining them.<\/p>\n<p>The threat posed by groups such as Turla underscores the importance for organizations and governments to remain vigilant by staying informed, sharing intelligence, and implementing security measures that can allow both groups and individuals to better protect themselves against these kinds of threat actors.<\/p>\n<p>The indicators of compromise for the various Turla campaigns can be found <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/23\/i\/examining-the-activities-of-the-turla-apt-group\/ioc-examining-the-activities-of-the-turla-apt-group.txt\">here<\/a>.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p>Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/i\/examining-the-activities-of-the-turla-group.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We examine the campaigns of the cyberespionage group known as Turla over the years, with a special focus on the key MITRE techniques and the corresponding IDs associated with the threat actor group. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53800,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9546,9510,9508,9523],"class_list":["post-53799","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-apttargeted-attacks","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-endpoints","tag-trend-micro-research-network"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Examining the Activities of the Turla APT Group 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Examining the Activities of the Turla APT Group 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-22T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/Turla-cover:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Examining the Activities of the Turla APT Group\",\"datePublished\":\"2023-09-22T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/\"},\"wordCount\":1272,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/examining-the-activities-of-the-turla-apt-group.png\",\"keywords\":[\"Trend Micro Research : APT&amp;Targeted Attacks\",\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Network\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/\",\"name\":\"Examining the Activities of the Turla APT Group 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/examining-the-activities-of-the-turla-apt-group.png\",\"datePublished\":\"2023-09-22T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/examining-the-activities-of-the-turla-apt-group.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/examining-the-activities-of-the-turla-apt-group.png\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : APT&amp;Targeted Attacks\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-apttargeted-attacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Examining the Activities of the Turla APT Group\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Examining the Activities of the Turla APT Group 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/","og_locale":"en_US","og_type":"article","og_title":"Examining the Activities of the Turla APT Group 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-09-22T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/Turla-cover:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Examining the Activities of the Turla APT Group","datePublished":"2023-09-22T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/"},"wordCount":1272,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/examining-the-activities-of-the-turla-apt-group.png","keywords":["Trend Micro Research : APT&amp;Targeted Attacks","Trend Micro Research : Articles, News, Reports","Trend Micro Research : Endpoints","Trend Micro Research : Network"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/","url":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/","name":"Examining the Activities of the Turla APT Group 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/examining-the-activities-of-the-turla-apt-group.png","datePublished":"2023-09-22T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/examining-the-activities-of-the-turla-apt-group.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/examining-the-activities-of-the-turla-apt-group.png","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/examining-the-activities-of-the-turla-apt-group\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : APT&amp;Targeted Attacks","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-apttargeted-attacks\/"},{"@type":"ListItem","position":3,"name":"Examining the Activities of the Turla APT Group"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53799"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53799\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53800"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}