Turla, also known as Snake or Uroburos, is one of the most sophisticated ongoing cyber-espionage campaigns.However, when the first research on Turla/Snake/Uroburos was published, it didn’t answer one major question: how do victims get infected? Now the latest Kaspersky Lab research on this operation reveals that Epic is the initial stage of the Turla victim infection mechanism.
The “Epic” project has been used since at least 2012, with the highest volume of activity observed in January-February 2014. Most recently, Kaspersky Lab detected this attack against one of its users on 5 August 2014.
Targets of “Epic” belong to the following categories: government entities (Ministry of Interior, Ministry of Trade and Commerce, Ministry of Foreign/External affairs, intelligence agencies), embassies, military, research and education
organisations, and pharmaceutical companies.
Most of the victims are located in the Middle East and Europe, however, researchers observed victims in other regions as well, including in the USA. In total, Kaspersky Lab experts counted several hundred victim IPs distributed in more than 45 countries, with France at the top of the list.
Kaspersky Lab’s researchers discovered that the Epic Turla attackers use zero-day exploits, social engineering and watering hole techniques (websites of a high interest to the victims that have been compromised by the attackers and injected to serve malicious code) attacks to infect victims. For example, in total, Kaspersky Lab have observed more than 100 injected websites (watering holes).
The choice of the websites reflects specific interest of attackers. For example, many of infected Spanish websites belong to local governments.
Whenever an unsuspecting user opens a maliciously-crafted PDF file on a vulnerable system, the machine will automatically get infected, allowing the attacker to gain immediate and full control over the target system.
Once the user becomes infected, the Epic backdoor immediately connects to the command-and-control (C&C) server to send a pack with the victim’s system information. When the system is compromised the attackers receive a brief summary of information from the victim, and based on that, they deliver a pre-configured batch files containing a series of commands for execution.
In addition to these, the attackers upload custom lateral movement tools, which include a specific keylogger tool, a RAR archiver and standard utilities like DNS query tool from Microsoft.
During the analysis, Kaspersky Lab researchers observed the attackers using the Epic malware to deploy a more sophisticated backdoor known as the “Cobra/Carbon system,” also named “Pfinet” by some anti-virus products.
After some time, the attackers went further and used the Epic implant to update the “Carbon” configuration file with a different set of C&C servers. The unique knowledge to operate these two backdoors indicates a clear and direct connection between them.
“The configuration updates for the “Carbon system” system malware are interesting, because this is another project from the Turla actor. This indicates that we are dealing with a multi-stage infection that begins with Epic Turla.
The Epic Turla is used to gain a foothold and validate the high profile victim. If the victim is interesting, it gets upgraded to the full Turla Carbon system,” explains Costin Raiu, director of the Global Research and Analysis Team at Kaspersky Lab.