Turla has been targeting governments and militaries since at least 2008.567
In December 2014 there was evidence of it targeting operating systems running Linux.8
The advanced persistent threat hacking group has also been named Turla.9 The group has probably been operating since the late 1990s, according to professor Thomas Rid of Johns Hopkins University.10 Dan Goodin in Ars Technica described Turla as "Russian spies".11 Turla has since been given other names such as Snake, Krypton, and Venomous Bear.
In May 2023 the United States Department of Justice announced that the United States had managed to infiltrate machines that were infected by the malware and issue a command ordering the malware to delete itself.12 Affidavits from the FBI and DOJ revealed that the group was part of the Russian Federal Security Service Center 16 group in Ryazan.13
ESET noted that the command and control protocol used by GoldenJackal malware is typically used by Turla, suggesting the groups may be connected.14
"The Russian Britney Spears Instagram hackers also used satellites to hide their tracks". Boing Boing. 8 June 2017. https://boingboing.net/2017/06/08/dvb-s.html ↩
"Suspected Russian spyware Turla targets Europe, United States". Reuters. 2014-03-13. https://www.reuters.com/article/us-russia-cyberespionage-insight-idUSBREA260YI20140307 ↩
"Archived copy" (PDF). Archived from the original (PDF) on 2020-10-26. Retrieved 2018-03-01.{{cite web}}: CS1 maint: archived copy as title (link) https://web.archive.org/web/20201026005331/https://www.valisluureamet.ee/pdf/raport-2018-ENG-web.pdf ↩
"Turla Hiding in the Sky: Russian Speaking Cyberespionage Group Exploits Satellites to Reach the Ultimate Level of Anonymity". kaspersky.com. 26 May 2021. https://www.kaspersky.com/about/press-releases/2015_turla-hiding-in-the-sky-russian-speaking-cyberespionage-group-exploits-satellites-to-reach-the-ultimate-level-of-anonymity ↩
Brewster, Tom (7 August 2014). "Sophisticated 'Turla' hackers spying on European governments, say researchers". The Guardian. https://www.theguardian.com/technology/2014/aug/07/turla-hackers-spying-governments-researcher-kaspersky-symantec ↩
"Turla: Spying tool targets governments and diplomats". https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=4501a782-fd84-4f44-a231-ee2a3e838c39&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments ↩
Baumgartner, Kurt (8 December 2014). "The 'Penquin' Turla". securelist.com. https://securelist.com/the-penquin-turla-2/67962/ ↩
Greenberg, Andy (2023-05-20). "The Underground History of Russia's Most Ingenious Hacker Group". Wired. Retrieved 2023-08-20. https://www.wired.com/story/turla-history-russia-fsb-hackers/ ↩
"You'll never guess where Russian spies are hiding their control servers". Ars Technica. 6 June 2017. https://arstechnica.com/security/2017/06/russian-hackers-turn-to-britney-spears-for-help-concealing-espionage-malware/ ↩
Lyons, Jessica (2024-10-09). "Moscow-adjacent GoldenJackal gang strikes air-gapped systems with custom malware". The Register. Retrieved 2024-10-16. https://www.theregister.com/2024/10/09/goldenjackal_custom_malware/ ↩