Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Russian State Hackers Collaborate in Attacks Against Ukraine
News

Russian State Hackers Collaborate in Attacks Against Ukraine

Team-CWDBy Team-CWDSeptember 19, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Two Russian state-linked threat actors, Gamaredon and Turla, are working together to compromise high-value defense targets in Ukraine, according to a new report by ESET.

These collaborations involve the shared use of tools in campaigns during 2025 and reflects a wider strategic culture within Russia’s internal security and national defense.

In four attacks observed in February, ESET captured a payload showing that Turla was able to issue commands via Gamaredon implants.

The downloader tool PteroGraphin, thought to be exclusive to Gamaredon, was used to restart Turla’s Kazuar backdoor malware. Therefore, it is likely PteroGraphin was used as a recovery method by Turla, possibly after Kazuar crashed or was not launched automatically.

Kazuar was used to download machine data, including victim’s computer name and username, list of running processes, OS version and lists of files and directories in various locations.

In April and June 2025, Kazuar v2 installers were deployed directly by Gamaredon tools.

These discoveries have led the researchers to conclude with high confidence that the two groups are collaborating.

“This is the first time that we have been able to link these two groups together via technical indicators,” the ESET researchers noted in the report published on September 19.

“The 2022 full-scale invasion of Ukraine has probably reinforced this convergence, with ESET data clearly showing Gamaredon and Turla activities focusing on the Ukrainian defense sector in recent months,” they added.

Collaborating FSB Groups with Different Targeting Strategies

Gamaredon and Turla are believed to be affiliated to the Russian Federal Security Service (FSB).

Both groups have been highly active since Russia’s invasion of Ukraine in 2022.

While Gamaredon has been observed compromising “hundreds if not thousands of machines,” Turla has only been detected on seven machines in Ukraine in the past 18 months. This suggests the group is only interested in specific machines, probably ones containing highly sensitive intelligence, the researchers noted.

Both actors are focused on cyber-espionage.

Gamaredon has been active since at least 2013, mostly targeting Ukrainian governmental institutions.

Turla has been active since at least 2004, possibly extending back to the late 1990s. It mainly focuses on high-profile targets, such as governments and diplomatic entities, in Europe, Central Asia and the Middle East.

In addition to the attacks detected in February, April and June, the researchers observed other cases of Gamaredon tools being present on machines in Ukraine where Kazuar was also present.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAutomating vCISO and Compliance Services
Next Article Zero-Click Flaw in ChatGPT’s Agent Enables Silent Gmail Data Theft
Team-CWD
  • Website

Related Posts

News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

2025’s most common passwords were as predictable as ever

January 21, 2026

What are brushing scams and how do I stay safe?

December 24, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.