{"id":6839,"date":"2025-09-19T23:41:23","date_gmt":"2025-09-19T23:41:23","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=6839"},"modified":"2025-09-19T23:41:23","modified_gmt":"2025-09-19T23:41:23","slug":"two-of-the-kremlins-most-energetic-hack-teams-are-collaborating-eset-says","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=6839","title":{"rendered":"Two of the Kremlin\u2019s most energetic hack teams are collaborating, ESET says"},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/04\/russia-cyber-hack-1000x648.jpeg\" \/><\/p>\n<p>Two of the Kremlin\u2019s most energetic hacking items not too long ago have been noticed collaborating in malware assaults that compromise high-value gadgets positioned in Ukraine, safety researchers mentioned Friday.<\/p>\n<p>One of many teams is Turla, which is well one of many world\u2019s most subtle superior persistent threats (well-organized and well-funded hacking teams, many backed by nation states, that concentrate on particular adversaries for years at a time). Researchers from a number of safety corporations largely agree that Turla was behind breaches of <span style=\"font-weight: 400\"> the <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2010\/08\/26\/technology\/26cyber.html\"><span style=\"font-weight: 400\">US Division of Protection in 2008<\/span><\/a><span style=\"font-weight: 400\">, and extra not too long ago, the <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web.archive.org\/web\/20180302201850\/https:\/\/uk.reuters.com\/article\/us-germany-cyber\/german-government-hack-was-part-of-worldwide-campaign-sources-idUKKCN1GE2H5\"><span style=\"font-weight: 400\">German Overseas Workplace<\/span><\/a><span style=\"font-weight: 400\"> and France&#8217;s army. The group has additionally been recognized for <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"http:\/\/arstechnica.com\/security\/2014\/12\/powerful-highly-stealthy-linux-trojan-may-have-infected-victims-for-years\/\"><span style=\"font-weight: 400\">unleashing stealthy Linux malware<\/span><\/a><span style=\"font-weight: 400\"> and utilizing <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/information-technology\/2015\/09\/how-highly-advanced-hackers-abused-satellites-to-stay-under-the-radar\/\"><span style=\"font-weight: 400\">satellite-based Web hyperlinks<\/span><\/a><span style=\"font-weight: 400\"> to take care of the stealth of its operations<\/span>. The group conducts narrowly focused assaults on high-value targets and retains a low profile.<\/p>\n<p>Gamaredon, in the meantime, is a separate APT recognized for conducting a lot wider-scale operations, usually concentrating on organizations in Ukraine. Whereas Turla takes pains to fly underneath the radar, Gamaredon doesn\u2019t appear to care about being detected and linked to the Russian authorities. Its malware usually goals to gather as a lot data from targets as doable over a brief time frame. Each Turla and Gamaredon are extensively assessed to be items of Russia\u2019s Russian Federal Safety Service (FSB), the nation\u2019s chief safety company and successor of the Soviet Union\u2019s KGB.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2025\/09\/two-of-the-kremlins-most-active-hack-groups-are-collaborating-eset-says\/\">Learn full article<\/a><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2025\/09\/two-of-the-kremlins-most-active-hack-groups-are-collaborating-eset-says\/#comments\">Feedback<\/a><\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Two of the Kremlin\u2019s most energetic hacking items not too long ago have been noticed collaborating in malware assaults that compromise high-value gadgets positioned in Ukraine, safety researchers mentioned Friday. One of many teams is Turla, which is well one of many world\u2019s most subtle superior persistent threats (well-organized and well-funded hacking teams, many backed [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6841,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[768,5445,679,5408,940,5444],"class_list":["post-6839","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-news","tag-active","tag-collaborating","tag-eset","tag-groups","tag-hack","tag-kremlins"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6839"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6839\/revisions"}],"predecessor-version":[{"id":6840,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6839\/revisions\/6840"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/6841"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69c6f7b5190636d50e9f6768. Config Timestamp: 2026-03-27 21:33:41 UTC, Cached Timestamp: 2026-04-06 00:14:23 UTC -->