Skip to main content
News Directory 3
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Menu
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Kremlin Hack Groups Collaborate - ESET Report - News Directory 3

Kremlin Hack Groups Collaborate – ESET Report

September 21, 2025 Lisa Park Tech
News Context
At a glance
  • Security researchers at‌ ESET have uncovered evidence of a collaboration between the Turla (also known⁢ as Snakebite) and Gamaredon (also‌ known as⁤ Armageddon) threat actors, two groups with...
  • ESET researchers, while analyzing compromised devices, ⁣discovered that Turla was issuing⁤ commands through Gamaredon implants.
  • Further evidence emerged‌ in April and June, when ESET detected Gamaredon malware deploying installers‍ for‌ Kazuar v2.
Original source: arstechnica.com

“`html

Turla and‌ Gamaredon Groups Linked Through Malware Collaboration

Table of Contents

  • Turla and‌ Gamaredon Groups Linked Through Malware Collaboration
    • Discovery of the Collaboration
    • Deployment of Kazuar by Gamaredon
    • Potential Motives and Targets
      • At a Glance
      • Editor’s Analysis
    • Background on the Threat Actors
      • Turla (Snakebite)
      • Gamaredon (Armageddon)

Security researchers at‌ ESET have uncovered evidence of a collaboration between the Turla (also known⁢ as Snakebite) and Gamaredon (also‌ known as⁤ Armageddon) threat actors, two groups with distinct histories and targets. The connection was established through the observed use‌ of‌ Turla’s proprietary kazuar ⁣malware by Gamaredon implants.

Published September 21, 2024, and updated for evergreen relevance.

Discovery of the Collaboration

ESET researchers, while analyzing compromised devices, ⁣discovered that Turla was issuing⁤ commands through Gamaredon implants. Specifically, ESET ‍software detected the use of⁢ PteroGraphin to restart‌ Kazuar, a proprietary malware used​ by Turla. This suggests PteroGraphin was employed as a recovery mechanism for Kazuar, potentially after crashes⁤ or failed automatic launches. ⁢ ESET details this “first chain” of evidence, marking the first time a technical link has been established ⁣between the two groups.

Deployment of Kazuar by Gamaredon

Further evidence emerged‌ in April and June, when ESET detected Gamaredon malware deploying installers‍ for‌ Kazuar v2. Unfortunately,ESET software was ⁣installed on the compromised systems ⁢*after* the payloads ‌were delivered,preventing full recovery ‌of‍ the​ malicious code. Despite this limitation, ESET believes the repeated instances⁢ strongly indicate an active collaboration between ⁢turla and‌ gamaredon.

Potential Motives and Targets

ESET speculates that Turla’s interest ‌lies‌ in specific, highly sensitive intelligence. ‌ Gamaredon is known for compromising ⁤a large‍ number of machines -⁢ potentially thousands -‍ suggesting they act as a broad reconnaissance and access provider. Turla likely leverages ⁣this access ‍to target systems containing valuable data. This division of labor allows Turla to focus its resources on the most promising targets.

At a Glance

  • What: evidence of collaboration‍ between the‍ Turla and Gamaredon ⁣threat actors.
  • How: Gamaredon implants were⁤ observed deploying and interacting with Turla’s Kazuar malware.
  • When: Evidence first detected in‍ early 2024, with deployments observed in April and June.
  • Why ‌it Matters: Highlights a potentially dangerous partnership between two sophisticated threat groups, increasing the risk to sensitive intelligence.
  • What’s‌ Next: ⁤ Continued monitoring of both ‍groups’ activities is crucial to understand the‍ scope and impact of this collaboration.

Editor’s Analysis

The collaboration between Turla and Gamaredon represents a meaningful escalation in cyber threat activity. Turla, a group ⁤with ties to Russian intelligence, is known for its advanced capabilities​ and‌ long-term espionage ‌campaigns. Gamaredon, while less sophisticated, has a proven ⁣track record of accomplished compromises. ‍ By combining their strengths, these groups create a more ⁤potent and adaptable threat. Organizations, especially those in government, defense, and ⁣critical infrastructure, ​should review their security posture⁣ and⁤ implement ‌robust detection and response measures. ‍ The use of PteroGraphin as a recovery tool for Kazuar also ‌demonstrates a⁢ level of operational security and resilience that should not be ​underestimated.

-Reviewed by a cybersecurity analyst ⁢on September 21, 2024

Background on the Threat Actors

Turla (Snakebite)

Turla, also ⁢known as⁣ Snakebite, is a sophisticated threat actor‍ believed to be affiliated with Russian intelligence services. They are ⁣known for their advanced persistent threat (APT) activities, targeting governments, military organizations, and research institutions worldwide. ⁤ Turla’s toolkit includes custom malware like⁤ Kazuar and ‍a variety of sophisticated techniques for ‍evading detection.

Gamaredon (Armageddon)

Gamaredon,⁣ also known as ‌Armageddon,

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Related

Search:

News Directory 3

ByoDirectory is a comprehensive directory of businesses and services across the United States. Find what you need, when you need it.

Quick Links

  • Disclaimer
  • Terms and Conditions
  • About Us
  • Advertising Policy
  • Contact Us
  • Cookie Policy
  • Editorial Guidelines
  • Privacy Policy

Browse by State

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado

Connect With Us

© 2026 News Directory 3. All rights reserved.

Privacy Policy Terms of Service