{"id":3435,"date":"2014-12-17T18:54:24","date_gmt":"2014-12-17T18:54:24","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3435"},"modified":"2020-02-27T03:52:08","modified_gmt":"2020-02-26T16:52:08","slug":"no-penguin-left-behind-epic-turla-apts-linux-component-discovered","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/no-penguin-left-behind-epic-turla-apts-linux-component-discovered\/3435\/","title":{"rendered":"No penguin left behind: Epic Turla APT&#8217;s Linux component discovered"},"content":{"rendered":"<p>Kaspersky Lab experts <a href=\"https:\/\/securelist.com\/blog\/research\/67962\/the-penquin-turla-2\/\" target=\"_blank\" rel=\"noopener\">unveiled<\/a> new Linux-targeting malware related to the infamous Turla APT.<\/p>\n<p>Epic Turla (aka Uroburos, Snake, etc.) is considered one of the most complex APTs in the world. Analysis on it was published earlier this year (see Securelist and Kaspersky Business blog for details), and the newly discovered malware seems to be the \u201cpreviously unknown piece of a larger puzzle\u201d, according to Kurt Baumgartner and Costin Raiu.<\/p>\n<p style=\"text-align: center;\">\n<\/p><p>All previously known \u201cpieces\u201d were targeting the Microsoft Windows family, both 32 and 64 bit, using zeroday vulnerabilities in Microsoft and Adobe products, and the appropriate backdoors. A Linux component was suspected, although it hadn\u2019t been observed in the wild. Until now.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>No penguin left behind: #EpicTurla #APT\u2019s #Linux component discovered<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FHYb5&amp;text=No+penguin+left+behind%3A+%23EpicTurla+%23APT%26%238217%3Bs+%23Linux+component+discovered+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The attacks committed in the course of the Epic Turla campaign are very sophisticated. It employs multistage infections, with a number of backdoors, keyloggers, rootkits, and other malicious tools deployed into the compromised systems consecutively.<\/p>\n<p>The most interesting point is the initial vector. Epic Turla uses relatively \u201cmundane\u201d methods. An attack scenario against a given business would look like this: First, a spearphishing e-mail is sent, crafted well enough to ensure it\u2019s going to be opened and the malicious payload activated. The e-mail is sent to the right person (previously identified by the attackers), it has industry (and situation) relevant headers \u2013 as does the attached document \u2013 and the spoofed source looks credible.<\/p>\n<p>Then there are waterhole attacks \u2013 and social engineering \u2013 used to lure the victims to compromised websites. Needless to say, compromising those sites is a separate activity, which requires some effort. This shows how thorough the actors behind the Epic Turla campaign are.<\/p>\n<p>The attackers are also notoriously dynamic in using exploits or different methods depending on what is available at the moment. Today, they may send you a spearphish and the next day you\u2019re prompted to download a fake Flash Player, etc.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/12\/06020225\/Epic-Turla-2-1024x1024.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3438\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/12\/06020225\/Epic-Turla-2.png\" alt=\"Epic-Turla\" width=\"1034\" height=\"1034\"><\/a><\/p>\n<p>Once they are in, the compromised system is served with a backdoor, then a keylogger. If attackers find their target is indeed of interest to them, a more advanced and sophisticated backdoor from the Carbon\/Cobra family is installed \u2013 again, in several stages (a detailed description is available <a href=\"https:\/\/securelist.com\/analysis\/publications\/65545\/the-epic-turla-operation\/\" target=\"_blank\" rel=\"noopener\">here<\/a>).<\/p>\n<p>Now, the Linux component \u2013 the so-called \u201cPenquin\u201d Turla. Why is it there if Epic Turla is mostly Windows oriented?<\/p>\n<p>The most likely answers are the most obvious. First, Linux is widely used on servers. And taking over a server means securing a nearly perfect spot to intercept the data of interest.<\/p>\n<p>Also, Linux-based endpoints are common in government organizations worldwide \u2013 both in developing and developed countries \u2013 and government organizations are the primary targets for Epic Turla.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Windows, Linux\u2026 How many more systems #EpicTurla attacks?<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FHYb5&amp;text=Windows%2C+Linux%E2%80%A6+How+many+more+systems+%23EpicTurla+attacks%3F\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Now the troubling part: According to Securelist, \u201cPenquin\u201d Turla is a stealth backdoor which doesn\u2019t require \u201celevated privileges\u201d \u2013 i.e. any administrative or root rights from the user. Even if a user with limited access to the system launches it, the backdoor can intercept incoming packets and run commands on the system incoming from the attackers while maintaining stealth. It is also rather hard to uncover, so if this thing slithers its way into the servers, it may be sitting tight and low indefinitely \u2013 depending on when the compromised system\u2019s operators check the machine for more exotic threats.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/12\/06020224\/wide-3-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3436\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/12\/06020224\/wide-3-1.png\" alt=\"wide-3\" width=\"1000\" height=\"555\"><\/a><\/p>\n<p>The question now is: How many more Epic Turla malware variants are out there undiscovered? What might they target, and what can potential victims do to stop it from happening?<\/p>\n<p>The technical tools capable of protecting your infrastructure from the \u201cinitial vector\u201d attacks listed above \u2013 namely phishing and waterholing \u2013 do exist, but it is also utterly important that the employees are aware of these threats and know how to counter them too.<\/p>\n<p>More data on Epic Turla campaign:<\/p>\n<ul>\n<li>Epic Operation Kicks Off Multistage Turla APT<\/li>\n<li><a href=\"https:\/\/securelist.com\/analysis\/publications\/65545\/the-epic-turla-operation\/\" target=\"_blank\" rel=\"noopener\">The Epic Turla Operation<\/a><\/li>\n<li><a href=\"https:\/\/securelist.com\/blog\/research\/67962\/the-penquin-turla-2\/\" target=\"_blank\" rel=\"noopener\">The \u2018Penquin\u2019 Turla: A Turla\/Snake\/Uroburos Malware for Linux<\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/epic-turla-catching-the-reptiles-tail\/2350\" target=\"_blank\" rel=\"noopener nofollow\">Epic Turla \u2013 catching the reptile\u2019s tail<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab experts unveiled new Linux-targeting malware related to the infamous Turla APT. Such modules were known to exist before, but never met in the wild. Until now.<\/p>\n","protected":false},"author":209,"featured_media":15814,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[282,2261,562,36],"class_list":{"0":"post-3435","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybersecurity","10":"tag-epic-turla-apt","11":"tag-linux","12":"tag-malware-2"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/no-penguin-left-behind-epic-turla-apts-linux-component-discovered\/3435\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/no-penguin-left-behind-epic-turla-apts-linux-component-discovered\/3435\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/no-penguin-left-behind-epic-turla-apts-linux-component-discovered\/3435\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/3435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=3435"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/3435\/revisions"}],"predecessor-version":[{"id":26602,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/3435\/revisions\/26602"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15814"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=3435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=3435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=3435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}