Kazuar si evolve: Secret Blizzard (Turla) trasforma il suo backdoor storico in una botnet P2P modulare invisibile

Il gruppo russo Secret Blizzard (Turla/FSB) ha trasformato il malware Kazuar in una botnet peer-to-peer con tre moduli distinti (Kernel, Bridge, Worker) e 150 parametri di configurazione. La nuova architettura usa un sistema di elezione del leader per ridurre al minimo il traffico verso i server C2, rendendo il rilevamento estremamente difficile. Obiettivi: governi, ambasciate e settore difesa in Europa e Ucraina.

https://insicurezzadigitale.com/kazuar-si-evolve-secret-blizzard-turla-trasforma-il-suo-backdoor-storico-in-una-botnet-p2p-modulare-invisibile/

Russian Hackers Upgrade Kazuar Backdoor to Modular Botnet

Microsoft researchers have uncovered a significant upgrade to the Kazuar backdoor, transforming it into a modular peer-to-peer botnet by the notorious Russian hacker group, Secret Blizzard. This sophisticated tool has been used to target high-stakes organizations and critical systems across Europe, Asia, and Ukraine.

https://osintsights.com/russian-hackers-upgrade-kazuar-backdoor-to-modular-botnet?utm_source=mastodon&utm_medium=social

#RussianHackers #KazuarBackdoor #ModularBotnet #SecretBlizzard #Turla

Russian Hackers Upgrade Kazuar Backdoor to Modular Botnet

Discover how Russian hackers upgraded Kazuar backdoor to a modular botnet, and learn how to protect your systems from this threat now effectively.

OSINTSights
Kazuar: Anatomy of a nation-state botnet | Microsoft Security Blog

Kazuar, a sophisticated malware family attributed to the Russian state actor Secret Blizzard, has been under constant development for years and continues to evolve in support of espionage-focused operations. Over time, Kazuar has expanded from a relatively traditional backdoor into a highly modular peer-to-peer (P2P) botnet ecosystem designed to enable persistent, covert access to target environments.

Microsoft Security Blog
Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats | Microsoft Security Blog

Microsoft Threat Intelligence has uncovered a cyberespionage campaign by the Russian state actor we track as Secret Blizzard that has been ongoing since at least 2024, targeting embassies in Moscow using an adversary-in-the-middle (AiTM) position to deploy their custom ApolloShadow malware.

Microsoft Security Blog

Microsoft Threat Intelligence has uncovered a #CyberEspionage campaign by the #Russian state actor tracked as #SecretBlizzard that targets embassies located in Moscow using an AiTM position at the ISP level to deploy custom #ApolloShadow #malware.

🔗 https://www.microsoft.com/en-us/security/blog/2025/07/31/frozen-in-transit-secret-blizzards-aitm-campaign-against-diplomats/

Microsoft catches Russian hackers targeting foreign embassies https://arstechni.ca/sdF8 #secretblizzard #embassies #Security #Biz&IT #russia #apts
Microsoft catches Russian hackers targeting foreign embassies

End goal is the installation of a malicious TLS root certificate for use in intel gathering.

Ars Technica
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine | Microsoft Security Blog

Since January 2024, Microsoft has observed Secret Blizzard using the tools or infrastructure of other threat groups to attack targets in Ukraine and download its custom backdoors Tavdig and KazuarV2.

Microsoft Security Blog
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine | Microsoft Security Blog

Since January 2024, Microsoft has observed Secret Blizzard using the tools or infrastructure of other threat groups to attack targets in Ukraine and download its custom backdoors Tavdig and KazuarV2.

Microsoft Security Blog
#Russian cyber-espionage group Turla, aka " #SecretBlizzard," is utilizing other threat actors' infrastructure to target Ukrainian military devices connected via Starlink. #CyberAttacks
#UkraineRussiaWar️️ https://www.bleepingcomputer.com/news/security/russian-turla-hackers-hit-starlink-connected-devices-in-ukraine/
Russian Turla hackers hit Starlink-connected devices in Ukraine

Russian cyber-espionage group Turla, aka "Secret Blizzard," is utilizing other threat actors' infrastructure to target Ukrainian military devices connected via Starlink.

BleepingComputer