Russian-Speaking Hackers Hijack Satellite Links To Hide Cyberspying Operation

  /     /     /  
Publicated : 22/11/2024   Category : security


Russian-Speaking Hackers Hijack Satellite Links To Hide Cyberspying Operation


Turla exploits unencrypted satellite links in Africa and the Middle East to evade detection.



A notorious cyber espionage gang believed to be out of Russia commandeers unencrypted satellite links to mask its information-stealing operations.
The so-called Turla group -- aka Snake  -- hijacks unencrypted downstream satellite links from customers of satellite providers in the Middle East and Africa, and then uses those connections to exfiltrate data from its cyber espionage victims, researchers from Kaspersky Lab say. Turla is best known for targeting government agencies, embassies, military, pharmaceutical, and research organizations in the US, Kazakhstan, Russia, Vietnam, and China.
Unencrypted one-way satellite communications are widely known to be vulnerable to hacking. A researcher at Black Hat USA last month
demonstrated how he was able to hack the Globalstar Simplex satellite data service
using equipment he purchased for less than $1,000. Colby Moore, information security officer with Synack, says an attacker could intercept, spoof or interfere with satellite communications between tracking devices, satellites or ground stations because the Globalstar network doesnt encrypt those links nor digitally sign or authenticate the data packets. Globalstar maintains that many … Globalstar devices have encryption deployed by its integrators.
Kurt Baumgartner, principal security researcher at Kaspersky Lab, says his firm believes the Turla cyber espionage gang has been employing hijacked satellite links for about seven years now--almost as long as the group has been in action. Weve seen these IPs cycled in Turlas activities, he says.
Its all about keeping their underlying command and control infrastructure operational and hidden from the prying eyes of researchers and others. But Turla isnt the only group thats employed satellite communications for their C&C, Baumgartner says. Weve seen a couple of other groups as well, he says. 
The notorious Hacking Team is among those that have used satellite-based IPs, as has the Xumuxu hacker group and the 
pro-Iranian Rocket Kitten hacking group
.
This is an unusual technique, Baumgartner says. Its selectively used by them [Turla]. Almost everything Turla does has some sort of criteria selection … Turla is one of the stealthier actors who have put a lot of effort into maintaining and investing in infrastructure so theyre really trying to maintain the anonymity of their infrastructure.
Theyre basically spoofing the legitimate satellite customer, who is none the wiser, he says. The data they are stealing flows over the link paid by the customer, he says. Turla doesnt bother hacking that customers data--thats not its goal. They wouldnt be able to do [this hijacking] if the link was encrypted, Baumgartner notes.
The technique works like this: Turla listens via an inexpensive antenna-based system for downstream communications from a satellite provider to spot active IP addresses of users online and then hijacks that connection. The pilfered satellite link is then used to siphon stolen information from high profile targets of Turla, according to Kasperskys research.
The data travels through conventional lines to the satellite Internet providers teleports, then up to the satellite, and finally down from the satellite to the users with the chosen IPs, Kaspersky says in its
new Turla research, published today
.
Kaspersky Lab stops short of calling out Turla as a Russian nation-state group: it describes Turla as a Russian-speaking cyberspying operation. But other security firms,
including Recorded Future
, believe its a Russian-based hacking operation.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Russian-Speaking Hackers Hijack Satellite Links To Hide Cyberspying Operation