Aleksander W. Jarosz
April 10, 2024

Turla APT Targets Albania With Backdooor in Ongoing Campaign to Breach European Organizations

Blog

Analyst Blog Post  Rectangular - threat actor

Prior to public reporting, infrastructure tied to the Russia-based Turla APT group was present in an organization possibly located in Albania.

File: 7aa5a936a67cf367c0f1e0a22f3290ae57d8af01679daa811bb975c2978ca8a3 contains IP address 91[.]193[.]18[.]120, which is a key indicator of compromise recently described by Cisco Talos as a command and control server used in parallel with the “TinyTurla-NG” (TTNG) backdoor. The file was uploaded manually to the VirusTotal web interface by a user located in Albania, dated March 26.  

Analysis reveals the file is indeed a list of IP addresses in a plain text file. It is named “Firewall_Bllok_IP.txt.txt”. Every IP address within is currently listed as malicious, and all but one IP address are registered on multiple Antivirus vendors. The file has no further OSINT links, further suggesting authenticity. 

Turla APT_Figure 1

Figure 1 - The plaintext file only lists IP addresses
(click on image to open in separate tab)
.

Turla APT_Figure 2
Figure 2 – Unique file uploaded manually from Albania-based
IP address on March 26 to the
VirusTotal user web interface
with ”
bllok”(block) written in Albanian.

The upload time falls within two Cisco reports regarding Tiny Turla activity, [1, 2] but prior to IP address 91[.]193[.]18[.]120 being made public. The targeting of Albania aligns with the regional interests of the APT campaign first described mid-February. This new activity provides additional intelligence into the possible scope of Russia-based APT operations, which has also included Poland in this campaign.

Baltic and Eastern European-based organizations with links to government are likely to continue to be high-value targets for cyberattacks throughout 2024 as they provide espionage channels for APT groups aligned to Russian interests in the broader context of the war in Ukraine. 


 


Structured Data

Find this and other research in our public TAXII collection for easy use in your security stack: https://cti.eclecticiq.com/taxii/discovery.

Please refer to our support page for guidance on how to access the feeds.

About EclecticIQ Intelligence & Research Team

EclecticIQ is a global provider of threat intelligence, hunting, and response technology and services. Headquartered in Amsterdam, the EclecticIQ Intelligence & Research Team is made up of experts from Europe and the U.S. with decades of experience in cyber security and intelligence in industry and government.

We would love to hear from you. Please send us your feedback by emailing us at research@eclecticiq.com.

You might also be interested in

Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign

WikiLoader Delivery Spikes in February 2024

10 Steps to Building a Comprehensive CTI Practice

References

[1] Cisco Talos, “TinyTurla Next Generation - Turla APT spies on Polish NGOs.” Accessed: Apr. 2, 2024. [Online]. Available: https://blog.talosintelligence.com/tinyturla-next-generation/ 

[2] Cisco Talos “New details on TinyTurla’s post-compromise activity reveal full kill chain.” Accessed: Apr. 3, 2024. [Online]. Available: https://blog.talosintelligence.com/tinyturla-full-kill-chain/ 

 

Talk to one of our experts

Protect your organization with cutting-edge threat intelligence. Book your free demo today and explore how our products and services can help you meet your security needs.
Book a call
cta-footer
Book a demo