Tuesday, January 9, 2024
HomeCyber SecuritySea Turtle Cyber Espionage Marketing campaign Targets Dutch IT and Telecom Corporations

Sea Turtle Cyber Espionage Marketing campaign Targets Dutch IT and Telecom Corporations


Jan 06, 2024NewsroomCyber Espionage / Provide Chain Assault

Telecommunication, media, web service suppliers (ISPs), info expertise (IT)-service suppliers, and Kurdish web sites within the Netherlands have been focused as a part of a brand new cyber espionage marketing campaign undertaken by a Türkiye-nexus menace actor often known as Sea Turtle.

“The infrastructure of the targets was vulnerable to provide chain and island-hopping assaults, which the assault group used to gather politically motivated info equivalent to private info on minority teams and potential political dissents,” Dutch safety agency Hunt & Hackett stated in a Friday evaluation.

“The stolen info is prone to be exploited for surveillance or intelligence gathering on particular teams and or people.”

Sea Turtle, additionally recognized by the names Cosmic Wolf, Marbled Mud (previously Silicon), Teal Kurma, and UNC1326, was first documented by Cisco Talos in April 2019, detailing state-sponsored assaults focusing on private and non-private entities within the Center East and North Africa.

Cybersecurity

Actions related to the group are believed to have been ongoing since January 2017, primarily leveraging DNS hijacking to redirect potential targets trying to question a selected area to an actor-controlled server able to harvesting their credentials.

“The Sea Turtle marketing campaign nearly definitely poses a extra extreme menace than DNSpionage given the actor’s methodology in focusing on numerous DNS registrars and registries,” Talos stated on the time.

In late 2021, Microsoft famous that the adversary carries out intelligence assortment to satisfy strategic Turkish pursuits from international locations like Armenia, Cyprus, Greece, Iraq, and Syria, hanging telecom and IT corporations with an goal to “set up a foothold upstream of their desired goal” through exploitation of recognized vulnerabilities.

Then final month, the adversary was revealed to be utilizing a easy reverse TCP shell for Linux (and Unix) programs known as SnappyTCP in assaults carried out between 2021 and 2023, in line with the PricewaterhouseCoopers (PwC) Risk Intelligence group.

“The online shell is an easy reverse TCP shell for Linux/Unix that has primary [command-and-control] capabilities, and can be seemingly used for establishing persistence,” the corporate stated. “There are at the very least two primary variants; one which makes use of OpenSSL to create a safe connection over TLS, whereas the opposite omits this functionality and sends requests in cleartext.”

The most recent findings from Hunt & Hackett present that Sea Turtle continues to be a stealthy espionage-focused group, performing protection evasion strategies to fly underneath the radar and harvest e-mail archives.

Cybersecurity

In one of many assaults noticed in 2023, a compromised-but-legitimate cPanel account was used as an preliminary entry vector to deploy SnappyTCP on the system. It is at the moment not recognized how the attackers obtained the credentials.

“Utilizing SnappyTCP, the menace actor despatched instructions to the system to create a duplicate of an e-mail archive created with the instrument tar, within the public net listing of the web site that was accessible from the web,” the agency famous.

“It’s extremely seemingly that the menace actor exfiltrated the e-mail archive by downloading the file immediately from the online listing.”

To mitigate the dangers posed by such assaults, it is suggested that organizations implement robust password insurance policies, implement two-factor authentication (2FA), fee restrict login makes an attempt to cut back the probabilities of brute-force makes an attempt, monitor SSH site visitors, and maintain all programs and software program up-to-date.

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.





Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments