📰 Russian APT Turla Evolves Kazuar Backdoor into Stealthy P2P Botnet

🇷🇺 Russian APT Turla has upgraded its Kazuar backdoor into a modular P2P botnet. The new architecture enhances stealth and resilience, making it harder to detect and disrupt. The focus remains on long-term espionage. #Turla #APT #Kazuar #CyberSecur...

🌐 cyber[.]netsecops[.]io

🔗 https://cyber.netsecops.io/articles/russian-apt-turla-upgrades-kazuar-backdoor-into-p2p-botnet/?utm_source=mastodon&utm_…

Kazuar si evolve: Secret Blizzard (Turla) trasforma il suo backdoor storico in una botnet P2P modulare invisibile

Il gruppo russo Secret Blizzard (Turla/FSB) ha trasformato il malware Kazuar in una botnet peer-to-peer con tre moduli distinti (Kernel, Bridge, Worker) e 150 parametri di configurazione. La nuova architettura usa un sistema di elezione del leader per ridurre al minimo il traffico verso i server C2, rendendo il rilevamento estremamente difficile. Obiettivi: governi, ambasciate e settore difesa in Europa e Ucraina.

https://insicurezzadigitale.com/kazuar-si-evolve-secret-blizzard-turla-trasforma-il-suo-backdoor-storico-in-una-botnet-p2p-modulare-invisibile/

Russian APT Turla builds long-term access tool with Kazuar Botnet evolution

Russia-linked APT group Turla turned its Kazuar malware into a stealthy P2P botnet for long-term access to compromised systems.

Security Affairs

The Russian state-sponsored group Turla (aka Secret Blizzard) has significantly evolved its Kazuar backdoor into a sophisticated, modular P2P botnet. This isn't just a new version; it's a fundamental architectural shift designed for extreme stealth and resilience. With its leader election and encrypted internal comms, Kazuar is now flying under the radar, making behavioral detection your only effective…

https://www.tpp.blog/1fy0hp6

#cybersecurity #turla #kazuar

🤖 This post was AI-generated.

Russian Hackers Upgrade Kazuar Backdoor to Modular Botnet

Microsoft researchers have uncovered a significant upgrade to the Kazuar backdoor, transforming it into a modular peer-to-peer botnet by the notorious Russian hacker group, Secret Blizzard. This sophisticated tool has been used to target high-stakes organizations and critical systems across Europe, Asia, and Ukraine.

https://osintsights.com/russian-hackers-upgrade-kazuar-backdoor-to-modular-botnet?utm_source=mastodon&utm_medium=social

#RussianHackers #KazuarBackdoor #ModularBotnet #SecretBlizzard #Turla

Russian Hackers Upgrade Kazuar Backdoor to Modular Botnet

Discover how Russian hackers upgraded Kazuar backdoor to a modular botnet, and learn how to protect your systems from this threat now effectively.

OSINTSights

Turla Upgrades Kazuar Backdoor to Modular P2P Botnet

Microsoft's Threat Intelligence team has uncovered a significant upgrade to the Kazuar backdoor by the notorious Russian state-sponsored group Turla, now a modular P2P botnet designed for long-term intelligence collection. This move enables Turla to maintain a persistent grip on compromised systems.

https://osintsights.com/turla-upgrades-kazuar-backdoor-to-modular-p2p-botnet?utm_source=mastodon&utm_medium=social

#Russia #Turla #Kazuar #ModularBotnet #P2pBotnet

Turla Upgrades Kazuar Backdoor to Modular P2P Botnet

Discover Turla's upgraded Kazuar backdoor, now a modular P2P botnet for long-term access and intelligence collection - learn how to protect your systems now.

OSINTSights
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 | Google Cloud Blog

Espionage and financially motivated threat actors are exploiting critical WinRAR vulnerability CVE-2025-8088.

Google Cloud Blog
🇷🇺 COMmand & Evade: Turla's Kazuar v3 Loader

This blog post analyzes the latest version of Turla’s Kazuar v3 loader, which was previously examined at the beginning of 2024. The upgraded loader heavily utilizes the Component Object Model (COM) and employs patchless Event Tracing for Windows (ETW) and Antimalware Scan Interface (AMSI) bypass techniques, as well as a control flow redirection trick, alongside various other methods to evade security solutions and increase analysis time. It is likely that this malware was used in the same campaign which ESET reported in their Gamaredon and Turla collaboration article, as the loaded Kazuar v3 payloads also use the agent label AGN-RR-01.

R136a1

// Turla + Gamaredon : alliance inédite entre APT russes

⚠️ Deux groupes APT liés au Kremlin, Turla et Gamaredon, collaborent pour la première fois en Ukraine. Une synergie inquiétante entre cyber-espionnage et sabotage.

🔗 https://www.datasecuritybreach.fr/turla-et-gamaredon-la-collaboration-inedite-de-deux-apt-russes/

#APT #CyberEspionnage #Turla #Gamaredon #Ukraine #zataz @Damien_Bancal

ESET uncovers Gamaredon–Turla collaboration in Ukraine cyberattacks

ESET found evidence that Russia-linked groups Gamaredon and Turla collaborated in cyberattacks on Ukraine between February and April 2025.

Security Affairs