Turla, a hacker group linked to Russia's FSB, has been re-registering expired domains to take control of banking trojans other hackers infected computers with via USB drives—according to Mandiant—then sifting the infections to find targets for espionage.

https://www.wired.com/story/russia-turla-fsb-usb-infection/

Turla, a Russian Espionage Group, Piggybacked on Other Hackers' USB Infections

The infamous, FSB-connected Turla group took over other hackers' servers, exploiting their USB drive malware for targeted espionage.

WIRED
Turla is infamously clever when it comes to this kind of thing, going as far back as the agent.btz USB worm it infected DoD computers with in 2008. Fifteen years later, as @Johnhultquist says, it's piggybacking on other hackers' USB malware instead, a much stealthier trick.
@agreenberg @[email protected] wonder if that’s how they’ve been blackmailing various elected officials in the United States and elsewhere. As China eyes restoring lost historical lands all of it becomes more and more desperate for Putin and the FSB.
@agreenberg didn't the NSA do the expired C&C domain registration too?
@martijn_grooten oh yeah? I don’t know that story. This is also a trick sometimes used by defenders to sinkhole botnets though right?

@agreenberg @martijn_grooten Martijn is right:

https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/

"Perhaps most costly to the attackers was their failure to renew some of the domains used by these servers. Out of the 300 or so domains used, about 20 were allowed to expire. Kaspersky quickly registered the domains and, over the past ten months, has used them to "sinkhole" the command channels, a process in which researchers monitor incoming connections from Equation Group-infected machines."

How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

"Equation Group" ran the most advanced hacking operation ever uncovered.

Ars Technica
@dangoodin @agreenberg I do recall that the Snowden leaks showed the NSA piggybacked on botnet infrastructure, for easy access and plausible deniability. I'm not 100% sure if it was through registering expired C&C domains though.
NSA secretly hijacked existing malware to spy on N. Korea, others

Snowden docs show NSA tapped into S. Korean exploits of N. Korean networks.

Ars Technica