Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Turla turns Kazuar backdoor into modular P2P botnet for persistent access

OpenAI launches ChatGPT for personal finance, allowing connection of bank accounts

Runway started by supporting filmmakers. Now they are trying to beat Google with AI.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Turla turns Kazuar backdoor into modular P2P botnet for persistent access
Identity

Turla turns Kazuar backdoor into modular P2P botnet for persistent access

By May 15, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 15, 2026Botnet/Threat Intelligence

A Russian state-sponsored hacking group known as Turla transformed the custom backdoor Katar into a modular peer-to-peer (P2P) botnet designed for stealthy and persistent access to compromised hosts.

According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), Turla has been assessed as belonging to Center 16 of Russia’s Federal Security Service (FSB). This overlaps with activity tracked by the broader cybersecurity community under the names ATG26, Blue Python, Iron Hunter, Pensive Ursa, Secret Blizzard (formerly Krypton), Snake, SUMMIT, Uroburos, Venomous Bear, Waterbug, and WRAITH.

The hacker group is known for attacks targeting government, diplomatic, and defense sectors in Europe and Central Asia, as well as endpoints previously compromised by Aqua Blizzard (also known as Actinium and Gamaredon) in support of the Kremlin’s strategic goals.

“This upgrade is in line with Secret Blizzard’s broader objective of gaining long-term access to the system for intelligence collection,” the Microsoft Threat Intelligence team said in a report released Thursday. “While many threat actors rely on increased use of native tools (resident binaries (LOLBins)) to avoid detection, Kazuar’s evolution to a modular bot highlights how Secret Blizzard is building resilience and stealth directly into its tools.”

A key tool in Turla’s arsenal is Katar, a sophisticated .NET backdoor that has been used consistently since 2017. Microsoft’s latest findings demonstrate an evolution from a “monolithic” framework to a modular bot ecosystem featuring three distinct component types, each with a clearly defined role. These changes allow for flexible configuration, reduce visible footprint, and facilitate a wide range of tasks.

Overview of kernel, bridge, and worker module interactions

Attacks distributing malware have been found to rely on droppers such as Pelmeni and ShadowLoader to decrypt and launch modules. The three module types that form the foundation of Zuar’s architecture are listed below.

The kernel acts as the central coordinator of the botnet by issuing tasks to worker modules, managing communication with bridge modules, maintaining logs of actions and collected data, performing anti-analytics and sandbox checks, and setting up the environment with configurations that specify various parameters related to command and control (C2) communication, data extraction timing, task management, file scanning and collection, and monitoring. Bridge acts as a proxy between the reader kernel module and the C2 server. Workers log keystrokes, hook Windows events, track tasks, and collect system information, file lists, and Messaging Application Programming Interface (MAPI) details.

The kernel module type exposes three internal communication mechanisms (via Windows Messaging, Mailslot, and Named Pipes) and three different ways to connect to attacker-controlled infrastructure (via Exchange Web Services, HTTP, and WebSockets). This component also “elects” a single kernel leader that communicates with the bridge module on behalf of other kernel modules.

How kernel leaders coordinate worker tasks and use bridges

“Elections are held via mailslots, and leaders are elected based on workload (the length of time a kernel module is running) divided by interruptions (reboots, logoffs, process terminations),” Microsoft explained. “Once a leader is elected, it announces itself as the leader and tells all other kernel modules to set SILENT. Only the elected leader is not SILENT, so the leader kernel module can log activity and request tasks through the bridge module.”

Another feature of this module is to start various threads, set up named pipe channels between kernel modules for interkernel communication, specify external communication methods, as well as facilitate kernel-to-worker and kernel-to-bridge communication via Windows Messaging or mailslots.

The kernel’s ultimate goal is to poll for new tasks from the C2 server, parse incoming messages, assign tasks to workers, update configuration, and send task results back to the server. Additionally, this module includes a task handler that allows it to process commands issued by kernel readers.

The data collected by the worker module is then aggregated, encrypted, and written to the malware’s working directory, from where it is exfiltrated to the C2 server.

“Kazuar uses a dedicated working directory as a central staging area on disk to support internal operations across modules,” Microsoft said. “This directory is defined by configuration and is consistently referenced using a fully qualified path to avoid ambiguity across execution contexts.”

“Within the working directory, Kazuar organizes data by functionality, separating tasks, collection output, logs, and configuration materials into separate locations. This design allows the malware to separate task execution from data storage and extraction, maintain operational state across reboots, and coordinate asynchronous activity between modules while minimizing direct interaction with external infrastructure.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenAI launches ChatGPT for personal finance, allowing connection of bank accounts

Related Posts

Four OpenClaw flaws allow data theft, privilege escalation, and persistence

May 15, 2026

What you can learn about your real attack surface by observing your tools for 45 days

May 15, 2026

TanStack supply chain attack attacks two OpenAI employee devices, forcing macOS updates

May 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Turla turns Kazuar backdoor into modular P2P botnet for persistent access

OpenAI launches ChatGPT for personal finance, allowing connection of bank accounts

Runway started by supporting filmmakers. Now they are trying to beat Google with AI.

Four OpenClaw flaws allow data theft, privilege escalation, and persistence

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.