Russian hacking group masquerades as Iranian spy network

Hacking technique highlights how difficult it is to attribute blame after a cyber attack

Russian hackers hijacked Iranian cyber espionage infrastructure to attack government and industry organisations in dozens of countries while pretending to be Iranian cyber attackers.

The Turla group, also known as VENOMOUS BEAR, infiltrated the systems of Iranian cyber criminals to launch attacks on Western targets, according to a joint report by the National Cyber Security Centre (NCSC) and National Security Agency (NSA).

Analysis by the two agencies revealed the Russian-linked group acquired a pair of tools associated with Iranian hackers, namely Neuron and Nautilus, as well as the data linked with it.

Turla then tested these tools against victims it had already compromised, before turning its attention towards new victims. Hackers scanned target organisations for backdoors planted by Iranian cyber criminals in order to exploit them and gain a foothold.

"The behaviour of Turla in scanning for backdoor shells indicates that whilst they had a significant amount of insight into the Iranian tools, they did not have full knowledge of where they were deployed," the NCSC said in an advisory.

"While attribution of attacks and proving authorship of tools can be very difficult particularly in the space of incident response on a victim network the weight of evidence demonstrates that Turla had access to Iranian tools and the ability to identify and exploit them to further Turla's own aims."

The volume of cyber attacks emanating from both Russia and Iran have risen substantially in recent months and years, as geopolitical tensions with the US have escalated.

Microsoft, for example, disclosed data in July suggesting that approximately 10,000 of its customers were targeted by state-sponsored attacks during the 12 months. Further analysis showed these attackers were predominately launched by five groups divided between three nations; Iran, Russia, and North Korea.

Analysis by the NCSC and NSA shows that the Neuron and Nautilus tools, deployed by Turla, were first seen deployed with the Snake rootkit on a range of victims. Followup investigations have shown inconsistencies, however, with these tools also deployed on a large cluster of victims in the Middle East, but not all in conjunction with the Snake implant.

Breaking this down further, it became clear to investigators that these victims were targeted by cyber criminals using virtual private server (IP) addresses linked with Iranian hackers. Furthermore, Iranian cyber criminals were actually the first to deploy these tools, with Turla piggybacking off them subsequently.

Turla, moreover, accessed and used the command and control (C2) infrastructure of Iranian hacking groups to launch its own attacks. The group also deployed its own implants against the infrastructure used by Iranian groups, using this to further their own access into the global operational infrastructure and to exfiltrate data.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

What is cyber warfare?
Security

What is cyber warfare?

22 Sep 2020
Best ransomware removal tools
ransomware

Best ransomware removal tools

22 Jan 2021
Hackers publish over 4,000 files stolen from SEPA in ransomware attack
Security

Hackers publish over 4,000 files stolen from SEPA in ransomware attack

22 Jan 2021
Weekly threat roundup: SAP, Windows 10, Chrome
vulnerability

Weekly threat roundup: SAP, Windows 10, Chrome

21 Jan 2021

Most Popular

School laptops sent by government arrive loaded with malware
malware

School laptops sent by government arrive loaded with malware

21 Jan 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021