Turla APT Group Abusing Satellite Internet Links

Security experts at Kaspersky Lab published a report on the Turla APT revealing the use Satellite links to control its botnet.

According to a new analysis published by the experts at Kaspersky Lab reported that the popular Turla APT group exploited poorly secured satellite infrastructure to hide command-and-control operations.

Turla APT was active in the last decade, security experts consider it a state-sponsored group of Russian hackers involved in long-running espionage campaigns.

The Turla APT hit more than 500 victims in 45 different countries worldwide, government agencies, military and diplomatic entities are privileged targets of the group.

The exploitation of satellite-based Internet connections offers some important advantages, such as making it difficult to identify the threat actors and the location of the C&C server.

Another advantage for the usage of hijacked downstream-only links is the low cost, nearly $1,000 a year, the bad actors use them to control the infected machine.

“On the one hand, it’s valuable because the true location and hardware of the C&C server cannot be easily determined or physically seized. Satellite-based Internet receivers can be located anywhere within the area covered by a satellite, and this is generally quite large. The method used by the Turla group to hijack the downstream links is highly anonymous and does not require a valid satellite Internet subscription.

Kaspersky explained that Turla APT used to hijack satellite DVB-S (digital video broadcasting satellite) links, in a way similar to the one presented at Black Hat in 2010. This technique requires minimal equipment including a satellite dish, a low-noise block downconverter, a dedicated DVB-S tuner on a PCIe card made by TBS Technologies, and a Linux PC.

“The TBS card is particularly well-suited to this task because it has dedicated Linux kernel drivers and supports a function known as a brute-force scan which allows wide frequency ranges to be tested for interesting signals,” the researchers wrote. “Of course, other PCI or PCIe cards might work as well, while, in general the USB-based cards are relatively poor and should be avoided.”

On the other hand, the disadvantage comes from the fact that satellite-based Internet is slow and can be unstable.” states the reports.

The experts at Kaspersky speculates that the Turla APT group, like other APTs, turn to satellite-based Internet links for C&C for mainly to avoid botnet takedowns by law enforcement and ISPs.

As explained in the report, both the legitimate users and attackers use satellite communications pointing satellite dishes point to the specific satellite that is broadcasting the traffic. The principal problem when dealing with satellite communications is that packets are unencrypted allowing attackers to abuse communication channels.

“Once an IP address that is routed through the satellite’s downstream link is identified, the attackers start listening for packets coming from the internet to this specific IP,” the researchers wrote. “When such a packet is identified, for instance a TCP/IP SYN packet, they identify the source and spoof a reply packet (e.g. SYN ACK) back to the source using a conventional Internet line.”

The experts also highlighted that due to slow links, firewalls are recommended and used to simply DROP packets to closed ports instead sending back a RST or FIN packet to the source. This circumstance is exploited by attackers.

The Turla APT has been abusing DVB-S (digital video broadcasting satellite) Internet providers in the Middle East and Africa, because their satellite beams do not cover Europe or Asia, far from the prying eyes of security firms that could uncover their operations.

The use of satellite links to control botnet is not an exclusive of the Turla APT, researchers observed other APTs and security firms relying on satellites to manage their malware such as Rocket Kitten, Xumuxu, and the Italian Hacking Team.

Enjoy the report!

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs –Turla APT, cyber espionage)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

12 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

15 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

1 day ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

1 day ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

2 days ago

This website uses cookies.