Epstein Files Full PDF

CLICK HERE
Technopedia Center
PMB University Brochure
Faculty of Engineering and Computer Science
S1 Informatics S1 Information Systems S1 Information Technology S1 Computer Engineering S1 Electrical Engineering S1 Civil Engineering

faculty of Economics and Business
S1 Management S1 Accountancy

Faculty of Letters and Educational Sciences
S1 English literature S1 English language education S1 Mathematics education S1 Sports Education
teknopedia

  • Registerasi
  • Brosur UTI
  • Kip Scholarship Information
  • Performance
Flag Counter
  1. World Encyclopedia
  2. Turla (malware) - Wikipedia
Turla (malware) - Wikipedia
From Wikipedia, the free encyclopedia
Malware package
This article may lack focus or be about more than one topic. Please help improve this article, possibly by splitting it or creating a disambiguation page. Relevant discussion may be found on the talk page. (June 2017) (Learn how and when to remove this message)
icon
You can help expand this article with text translated from the corresponding article in Ukrainian. (June 2017) Click [show] for important translation instructions.
  • Machine translation, like DeepL or Google Translate, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machine-translated text into the English Wikipedia.
  • Consider adding a topic to this template: there are already 315 articles in the main category, and specifying|topic= will aid in categorization.
  • Do not translate text that appears unreliable or low-quality. If possible, verify the text with references provided in the foreign-language article.
  • You must provide copyright attribution in the edit summary accompanying your translation by providing an interlanguage link to the source of your translation. A model attribution edit summary is Content in this edit is translated from the existing Ukrainian Wikipedia article at [[:uk:Змія (комп'ютерний хробак)]]; see its history for attribution.
  • You may also add the template {{Translated|uk|Змія (комп'ютерний хробак)}} to the talk page.
  • For more guidance, see Wikipedia:Translation.

Turla or Uroboros (Russian: Турла) is a trojan package that is suspected by computer security researchers and Western intelligence officers to be the product of a Russian government agency of the same name.[1][2][3]

High infection rates of the virus were observed in Russia, Kazakhstan and Vietnam, followed by US and China, and low infection rates in Europe, South America and Asia (including India).[4]

Malware

[edit]

Turla has been targeting governments and militaries since at least 2008.[2][5][6]

In December 2014 there was evidence of it targeting operating systems running Linux.[7]

Group

[edit]

The advanced persistent threat hacking group has also been named Turla.[1] The group has probably been operating since the late 1990s, according to professor Thomas Rid of Johns Hopkins University.[8] Dan Goodin in Ars Technica described Turla as "Russian spies".[9] Turla has since been given other names such as Snake, Krypton, and Venomous Bear.

US actions against group

[edit]

In May 2023 the United States Department of Justice announced that the United States had managed to infiltrate machines that were infected by the malware and issue a command ordering the malware to delete itself.[8] Affidavits from the FBI and DOJ revealed that the group was part of the Russian Federal Security Service Center 16 group in Ryazan.[8]

Possible GoldenJackal connection

[edit]

ESET noted that the command and control protocol used by GoldenJackal malware is typically used by Turla, suggesting the groups may be connected.[10]

See also

[edit]
  • Agent.BTZ
  • Red October (malware)

References

[edit]
  1. ^ a b "The Russian Britney Spears Instagram hackers also used satellites to hide their tracks". Boing Boing. 8 June 2017.
  2. ^ a b "Suspected Russian spyware Turla targets Europe, United States". Reuters. 2014-03-13.
  3. ^ "Archived copy" (PDF). Archived from the original (PDF) on 2020-10-26. Retrieved 2018-03-01.{{cite web}}: CS1 maint: archived copy as title (link)
  4. ^ "Turla Hiding in the Sky: Russian Speaking Cyberespionage Group Exploits Satellites to Reach the Ultimate Level of Anonymity". kaspersky.com. 26 May 2021.
  5. ^ Brewster, Tom (7 August 2014). "Sophisticated 'Turla' hackers spying on European governments, say researchers". The Guardian.
  6. ^ "Turla: Spying tool targets governments and diplomats".
  7. ^ Baumgartner, Kurt (8 December 2014). "The 'Penquin' Turla". securelist.com.
  8. ^ a b c Greenberg, Andy (2023-05-20). "The Underground History of Russia's Most Ingenious Hacker Group". Wired. Retrieved 2023-08-20.
  9. ^ "You'll never guess where Russian spies are hiding their control servers". Ars Technica. 6 June 2017.
  10. ^ Lyons, Jessica (2024-10-09). "Moscow-adjacent GoldenJackal gang strikes air-gapped systems with custom malware". The Register. Retrieved 2024-10-16.
  • v
  • t
  • e
Hacking in the 2010s
← 2000s
Timeline
2020s →
Major incidents
2010
  • Operation Aurora (publication of 2009 events)
  • Australian cyberattacks
  • Operation Olympic Games
  • Operation ShadowNet
  • Operation Payback
2011
  • Canadian government
  • DigiNotar
  • DNSChanger
  • HBGary Federal
  • Operation AntiSec
  • PlayStation network outage
  • RSA SecurID compromise
2012
  • LinkedIn hack
  • Stratfor email leak
  • Operation High Roller
2013
  • South Korea cyberattack
  • Snapchat hack
  • Cyberterrorism attack of June 25
  • 2013 Yahoo! data breach
  • Singapore cyberattacks
2014
  • Anthem medical data breach
  • Operation Tovar
  • 2014 celebrity nude photo leak
  • 2014 JPMorgan Chase data breach
  • 2014 Sony Pictures hack
  • Russian hacker password theft
  • 2014 Yahoo! data breach
2015
  • Office of Personnel Management data breach
  • HackingTeam
  • Ashley Madison data breach
  • TalkTalk data breach
  • VTech data breach
  • Ukrainian Power Grid Cyberattack
  • SWIFT banking hack
2016
  • Bangladesh Bank robbery
  • Hollywood Presbyterian Medical Center ransomware incident
  • Commission on Elections data breach
  • Democratic National Committee cyber attacks
  • Vietnam Airport Hacks
  • DCCC cyber attacks
  • Indian Bank data breaches
  • Surkov leaks
  • Dyn cyberattack
  • Russian interference in the 2016 U.S. elections
  • 2016 Bitfinex hack
2017
  • SHAttered
  • 2017 Macron e-mail leaks
  • WannaCry ransomware attack
  • Westminster data breach
  • Petya and NotPetya
    • 2017 Ukraine ransomware attacks
  • Equifax data breach
  • Deloitte breach
  • Disqus breach
2018
  • Trustico
  • Atlanta cyberattack
  • British Airways data breach
  • SingHealth data breach
2019
  • Sri Lanka cyberattack
  • Baltimore ransomware attack
  • Bulgarian revenue agency hack
  • WhatsApp snooping scandal
  • Jeff Bezos phone hacking incident
Hacktivism
  • Anonymous
    • associated events
  • CyberBerkut
  • GNAA
  • Goatse Security
  • Lizard Squad
  • LulzRaft
  • LulzSec
  • New World Hackers
  • NullCrew
  • OurMine
  • PayPal 14
  • RedHack
  • Teamp0ison
  • TDO
  • UGNazi
  • Ukrainian Cyber Alliance
Groups
  • Appin
  • Bangladesh Black Hat Hackers
  • Bureau 121
  • Charming Kitten
  • Cozy Bear
  • Dark Basin
  • DarkMatter
  • Elfin Team
  • Equation Group
  • Fancy Bear
  • GOSSIPGIRL (confederation)
  • Guccifer 2.0
  • Hacking Team
  • Helix Kitten
  • Iranian Cyber Army
  • Islamic State Hacking Division
  • Lazarus Group
    • BlueNorOff
    • AndAriel
  • Lords of Dharmaraja
  • NSO Group
  • Numbered Panda
  • PLA Unit 61398
  • PLA Unit 61486
  • PLATINUM
  • Pranknet
  • Red Apollo
  • Rocket Kitten
  • Stealth Falcon
  • Syrian Electronic Army
  • Tailored Access Operations
  • The Shadow Brokers
  • xDedic
  • Yemen Cyber Army
Individuals
  • Ryan Ackroyd
  • Mustafa Al-Bassam
  • Kim Anh Vo
  • George Hotz
  • Guccifer
  • Elliott Gunton
  • Jeremy Hammond
  • Sam Hocevar
  • Junaid Hussain
  • MLT
  • Sabu
  • Track2
  • Topiary
  • The Jester
Major vulnerabilities
publicly disclosed
  • Evercookie (2010)
  • iSeeYou (2013)
  • Heartbleed (2014)
  • Shellshock (2014)
  • POODLE (2014)
  • Rootpipe (2014)
  • Row hammer (2014)
  • SS7 vulnerabilities (2014)
  • WinShock (2014)
  • JASBUG (2015)
  • Stagefright (2015)
  • DROWN (2016)
  • Badlock (2016)
  • Dirty COW (2016)
  • Cloudbleed (2017)
  • Broadcom Wi-Fi (2017)
  • EternalBlue (2017)
  • DoublePulsar (2017)
  • Silent Bob is Silent (2017)
  • KRACK (2017)
  • ROCA vulnerability (2017)
  • BlueBorne (2017)
  • Meltdown (2018)
  • Spectre (2018)
  • EFAIL (2018)
  • Exactis (2018)
  • Speculative Store Bypass (2018)
  • Lazy FP state restore (2018)
  • TLBleed (2018)
  • SigSpoof (2018)
  • Foreshadow (2018)
  • Dragonblood (2019)
  • Microarchitectural Data Sampling (2019)
  • BlueKeep (2019)
  • Kr00k (2019)
Malware
2010
  • Bad Rabbit
  • Black Energy 2
  • SpyEye
  • Stuxnet
2011
  • Coreflood
  • Alureon
  • Duqu
  • Kelihos
  • Metulji botnet
  • Stars
2012
  • Carna
  • Dexter
  • FBI
  • Flame
  • Mahdi
  • Red October
  • Shamoon
2013
  • CryptoLocker
  • DarkSeoul
2014
  • Brambul
  • Black Energy 3
  • Carbanak
  • Careto
  • DarkHotel
  • Duqu 2.0
  • FinFisher
  • Gameover ZeuS
  • Regin
2015
  • Dridex
  • Hidden Tear
  • Rombertik
  • TeslaCrypt
  • Project Sauron
2016
  • Hitler
  • Jigsaw
  • KeRanger
  • Necurs
  • MEMZ
  • Mirai
  • Pegasus
  • Petya and NotPetya
  • Philadelphia
  • X-Agent
2017
  • BrickerBot
  • Kirk
  • LogicLocker
  • Rensenware
  • Triton
  • WannaCry
  • XafeCopy
2018
  • Annabelle
  • VPNFilter
2019
  • Grum
  • Joanap
  • NetTraveler
  • R2D2
  • Tinba
  • Titanium
  • ZeroAccess botnet


Stub icon

This malware-related article is a stub. You can help Wikipedia by adding missing information.

  • v
  • t
  • e
Retrieved from "https://teknopedia.ac.id/w/index.php?title=Turla_(malware)&oldid=1310243718"
Categories:
  • Spyware
  • Linux malware
  • Hacking (computer security)
  • Espionage
  • Cyberwarfare
  • Hacker groups
  • Hacking in the 2010s
  • Russian advanced persistent threat groups
  • Cybercrime in India
  • Malware stubs
Hidden categories:
  • CS1 maint: archived copy as title
  • Articles with short description
  • Short description matches Wikidata
  • Wikipedia articles lacking focus from June 2017
  • All Wikipedia articles lacking focus
  • Articles needing translation from Ukrainian Wikipedia
  • All stub articles

  • indonesia
  • Polski
  • العربية
  • Deutsch
  • English
  • Español
  • Français
  • Italiano
  • مصرى
  • Nederlands
  • 日本語
  • Português
  • Sinugboanong Binisaya
  • Svenska
  • Українська
  • Tiếng Việt
  • Winaray
  • 中文
  • Русский
Sunting pranala
url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url
Pusat Layanan

UNIVERSITAS TEKNOKRAT INDONESIA | ASEAN's Best Private University
Jl. ZA. Pagar Alam No.9 -11, Labuhan Ratu, Kec. Kedaton, Kota Bandar Lampung, Lampung 35132
Phone: (0721) 702022
Email: pmb@teknokrat.ac.id