/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Microsoft and Lumen's Black Lotus Labs find Russia-linked Turla hackers hijacked Pakistan-based hackers' servers to launch their own attacks since December 2022

The notorious Russian cyber-espionage group Turla is hacking other hackers, hijacking the Pakistani threat actor Storm-0156's infrastructure …

BleepingComputer Bill Toulas

Discussion

  • @lukaszolejnik Lukasz Olejnik on bluesky
    Russian cyber threat actor Turla hacked 33 infrastructure nodes of Pakistani-based cyber threat actor, “Storm-0156” to attack other targets, to deploy their own cyber tools (malware) for cyber-espionage purposes vs Afghan government and India.  It delays attribution. blog.lumen.c…
  • @hultquist John Hultquist on bluesky
    Second time we've seen Turla sit on top of someone else's operation. blog.lumen.com/snowblind-th...
  • @pylos.co Joe Slowik on bluesky
    This is really neat:  —  blog.lumen.com/snowblind-th...
  • @loumariehsd Louise Marie Hurel on x
    FSB's Center 16 tracked as Secret Blizzard/Turla has used the tools and infrastructure of at least 6 other threat actors during the past 7 years for the exclusive purpose of facilitating espionage operations. https://www.microsoft.com/...
  • @greglesnewich Greg Lesnewich on x
    holy smokes the MSFT and Lumen reporting on Turla have some bomb shells - co-opting SideCopy infrastructure - borrowed Tomiris from another actor to load their tooling - SideCopy was in the parking lot of targets to pop em? https://blog.lumen.com/... https://www.microsoft.com/..…
  • @msftsecintel @msftsecintel on x
    Based on our findings and those reported by governments and other security vendors, Microsoft Threat Intelligence assesses the Russian nation-state actor we track as Secret Blizzard has used the tools and infrastructure of at least 6 other threat actors during the past 7 years.