Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russian hackers Gamaredon and Turla are working together to deploy Kazuar Backdoor in Ukraine
Identity

Russian hackers Gamaredon and Turla are working together to deploy Kazuar Backdoor in Ukraine

userBy userSeptember 19, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have identified evidence that two Russian hacking groups Gamaredon and Turla work together to target and collaborate with Ukrainian groups.

Slovak Cybersecurity Company ESET said that in February 2025 the Gamaredon Tools Pterographin and Pteroodd, which are used to run the Kazuar Backdoor of Turla Group on Ukrainian endpoints, were observed.

“Pterographin was used to restart the Kazuar V3 backdoor, possibly after it crashed or not launched automatically,” ESET said in a report shared with Hacker News. “Therefore, Pterographin was probably used as a recovery method by Turla.”

In another example in April and June 2025, ESET also said it had detected Kazuar V2 deployment through two other Gamaredon malware families tracked as Pteroodd and Pteropaste.

Gammerderson (aka Aqua Blizzard and Armageddon) and Tara (aka Secret Blizzard and the toxic bear) are rated as partnering with the Russian Federation Security Bureau (FSB) and are known for attacks targeting Ukraine.

DFIR Retainer Service

“Gummerderson has been active since at least 2013. He is primarily responsible for many attacks on Ukrainian government agencies,” ESET said.

“Tara, also known as Snake, is an infamous cyberspy group that has been active since at least 2004 and has been extended to the late 1990s. It focuses primarily on well-known targets such as governments and diplomatic groups in Europe, Central Asia and the Middle East.

The cybersecurity company says that a full-scale Russian invasion in Ukraine in 2022 is likely to drive this convergence, with the attacks focusing primarily on Ukraine’s defense sector in recent months.

One of Turla’s classic implants is Kazuar. This is a frequently updated malware that previously used Amadey bots to deploy a backdoor called Tavdig. Early malware-related artifacts have been discovered in the wild by 2016, on a per Kaspersky basis.

Meanwhile, Pterographin, Pteroodd, and Pteropaste are part of the growing arsenal of tools developed by Gameardeon to provide additional payloads. Pterographin is a PowerShell tool that uses Microsoft Excel Add-in and scheduled tasks as persistence mechanisms and uses the Telegraph API for Command and Control (C2). It was first discovered in August 2024.

The exact initial access vectors used by Gameardon is not clear, but the group has a history of using spear phishing and malicious LNK files on removable drives using tools for propagation such as Pterolnk.

Overall, over the past 18 months, Turla-related metrics have been detected on seven Ukrainian machines, four of which were violated by Gamaredon in January 2025. It is said that the latest version of Kazuar V3 was released until the end of February.

“Kazuar V2 and V3 are fundamentally the same malware family and share the same codebase,” ESET said. “Kazuar V3 is made up of approximately 35% C# lines than Kazuar V2, and introduces additional network transport methods. We’ll show you the WebSocketsand Exchange web service.”

The attack chain included the deployment of Pterographin. It was used to download a Powershell downloader called Pteroodd and ran Kazuar by getting the payload from Telegraph. The payload is designed to collect and remove the victim’s computer name and the serial number of the system drive volume into the CloudFlare worker subdomain before launching Kazur.

That being said, it is important to note that there are indications that Gandan downloaded Kazuar, as it has been said that backdoors have been in the system since February 11, 2025.

In signs that this is not an isolated phenomenon, ESET revealed that in March 2025 it had identified another Pteroodd sample on another machine in Ukraine, where Kazuar also existed. Malware can harvest a wide range of system information along with a list of installed .NET versions and send it to an external domain (“eset.ydns[.]european union”).

CIS Build Kit

Gameardon’s toolset lacks .NET malware, and the fact that Turla’s Kazuar is based on .NET suggests that this data collection step is likely intended for Turla.

The second set of attacks was detected in mid-April 2025 when another PowerShell downloader was dropped using Pteroodd.[.]EU “The domain that provides Kazuar V2 (“scrs.ps1”) documented by Palo Alto Networks in the second half of 2023.

ESET said that the third attack chain was also detected on June 5th and 6th, 2025. A PowerShell Downloader called Pteropaste is used to drop and install Kazuar V2 (“ekrn.ps1”) from the domain “91.231.182.”[.]187 “On two machines in Ukraine. The use of the name “Ekrn” is an attempt by a threat actor under the guise of “Ekrn.exe,” a legitimate binary associated with ESET endpoint security products.

“We believe that both groups are now associated individually with the FSB – working together, and that Gangon offers early access to Turla,” said ESET researchers Matthieu Faou and Zoltán Rusnák.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUK arrests two teen scattered spider hackers linked in August 2024 TFL Cyber ​​Attack
Next Article UKRI sets 27 new actions to transform the UK food system
user
  • Website

Related Posts

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

October 16, 2025

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.