This articlemay lack focus ormay be aboutmore than one topic. Pleasehelp improve this article, possibly bysplitting the article or organising adisambiguation page. There might be further discussion about this on thetalk page.(June 2017) |
You can helpexpand this article with text translated fromthe corresponding article in Ukrainian. (June 2017)Click [show] for important translation instructions.
|
Turla orUroboros (Russian:Турла) is atrojan package that is suspected bycomputer security researchers and Westernintelligence officers to be the product of aRussian government agency of the same name.[1][2][3]
High infection rates of the virus were observed in Russia, Kazakhstan and Vietnam, followed by US and China, and low infection rates in Europe, South America and Asia (including India).[4]
Turla has been targetinggovernments andmilitaries since at least 2008.[2][5][6]
In December 2014 there was evidence of it targeting operating systems runningLinux.[7]
The advanced persistent threat hacking group has also been namedTurla.[1] The group has probably been operating since the late 1990s, according to professor Thomas Rid ofJohns Hopkins University.[8] Dan Goodin inArs Technica described Turla as "Russian spies".[9] Turla has since been given other names such asSnake, Krypton, and Venomous Bear.
In May 2023 theUnited States Department of Justice announced that the United States had managed to infiltrate machines that were infected by the malware and issue a command ordering the malware to delete itself.[8] Affidavits from theFBI and DOJ revealed that the group was part of the RussianFederal Security Service Center 16 group inRyazan.[8]
ESET noted that thecommand and control protocol used byGoldenJackal malware is typically used by Turla, suggesting the groups may be connected.[10]
{{cite web}}: CS1 maint: archived copy as title (link)