On Tuesday, April 19th, 2021, the United States government announced that it had authorized the disruption of a global network compromised by an advanced malware strain called Snake. The malware was used by Russia’s Federal Security Service (FSB) and was responsible for long-term intelligence collection on high-priority targets. The announcement brought to light the most sophisticated cyber espionage tool ever created, which was the handiwork of a Russian state-sponsored group called Turla.
Turla is the Russian state-sponsored group behind Snake
Turla is a Russian state-sponsored group known for its advanced cyber espionage campaigns. It is believed to have been active since the early 2000s and has been responsible for numerous high-profile attacks. According to reports, Turla mainly targets government agencies, diplomatic organizations, military targets, educational institutions, and research centers. Snake is considered Turla’s most sophisticated cyber espionage tool, and it has reportedly been used by the group since at least 2018.
Operation MEDUSA and PERSEUS
To neutralize the Snake malware, the U.S. Federal Bureau of Investigation (FBI) created a tool named PERSEUS. Operation MEDUSA was orchestrated to disrupt the global network. The authorities were able to issue commands to the malware using the PERSEUS tool, causing it to overwrite its vital components on infected machines. By doing this, the PERSEUS tool ensured that Turla would not be able to access the data stolen from the infected machines, thus neutralizing the Snake malware.
Snake Malware
The Snake malware is designed as a covert tool for long-term intelligence collection on high-priority targets. The US Cybersecurity and Infrastructure Security Agency (CISA) reported that the malware is based on C language and uses custom communication methods in its modules, adding a new layer of stealth. The modular architecture of the malware allows for an efficient way to inject or modify components to augment its capabilities and retain persistent access to valuable information. This makes it very difficult to detect and remove.
Turla’s Global Infrastructure and Focus
Turla’s infrastructure is spread across more than 50 countries in North America, South America, Europe, Africa, Asia, and Australia. The group has a history of targeting entities in Europe, the Commonwealth of Independent States (CIS), and countries affiliated with NATO. This indicates a continued interest in espionage and stealing valuable data from governments and organizations.
Turla victimizes sectors in the US
Turla has targeted various sectors in the United States, including education, small businesses, and media organizations. The group has also been known to target critical infrastructure sectors such as government facilities, financial services, critical manufacturing, and communications. This suggests that Turla is interested in acquiring valuable information from a diverse range of sources.
Turla’s Continuing Threat
Despite the successful disruption of the Snake malware, Turla remains an active and formidable adversary. The group has an array of tactics and tools at its disposal to breach its targets across Windows, macOS, Linux, and Android. As a Russian state-sponsored group, it is expected that Turla will continue with its sophisticated cyber-espionage campaigns. It is important for organizations to ensure that they have robust security measures in place to defend themselves against Turla’s attacks.
The U.S. government’s disruption of the global network compromised by the Snake malware is a significant achievement. However, the threat from Turla remains, highlighting the need for strong and updated security measures. It is crucial that governments and organizations remain vigilant and regularly keep their systems and software up-to-date to ensure they remain secure. As Turla continues to develop and deploy new tactics and tools in their advanced cyber-espionage campaigns, the world must be prepared to defend itself against these ever-evolving threats.