Security News > 2024 > February > Turla hackers backdoor NGOs with new TinyTurla-NG malware

Security researchers have identified and analyzed new malware they call TinyTurla-NG and TurlaPower-NG used by the Russian hacker group Turla to maintain access to a target's network and to steal sensitive data.
According to the researchers, TinyTurla-NG is actively targeting multiple NGOs in Poland.
The TinyTurla-NG malware acts as a backdoor and its purpose is to provide the threat actor access to the compromised system when all other mechanisms fail or when they've been detected and removed.
Data exfiltration is done using malicious PowerShell scripts, which the researchers named TurlaPower-NG, delivered through the new backdoor.
There are at least three variants of the TinyTurla-NG backdoor but the researchers could get access to only two of them.
While TinyTurla-NG's code is different from the threat actor's older TinyTurla implant, they both have the same use acting as a "Secret backdoor" that continues to provide access when other methods become unsuccessful.
News URL
Related news
- North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware (source)
- Chinese hackers use custom malware to spy on US telecom networks (source)
- New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems (source)
- Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits (source)
- New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors (source)
- Chinese FamousSparrow hackers deploy upgraded malware in attacks (source)
- North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages (source)
- Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool (source)