The Turla hacking group is an APT (Advanced Persistent Threat), which is known to be operating from the Russian Federation. Malware researchers believe that the Turla hacking group is sponsored directly by the Kremlin and is used in politically motivated attacks aimed at furthering Russian interests in the global political scene. They tend to attack organizations operating in the military, technology, and energy industries. The Turla hacking group also often launches attacks against various government bodies. Recently, cybersecurity experts have detected two new malware families who are believed to belong to the Turla hacking group – Nautilus and Neuron. So far, the Turla hacking group has used these two new strains in campaigns targeting companies in the United Kingdom. However, if these operations are successful, it is likely that these two new threats may be used in future campaigns with different targets.
Turla Updates Its Hacking Tools Regularly
It would appear that the Turla hacking group is almost always using these two hacking tools in unison. Traces of the Nautilus-Neuron power-duo have been found on the Web and mail servers infiltrated by the Russian APT. Both the Nautilus and Neuron tools are fully equipped to detect and avoid sandbox environments. This means that cybersecurity experts are going to have a really hard time trying to dissect these threats. Furthermore, their task has been made even more difficult because the code of the Nautilus and Neuron malware is heavily obfuscated. The Turla hacking group is known to be very active and careful when carrying out campaigns, and this case is no exception. Malware researchers have noticed that the hacking group is keeping a close eye on both their hacking tools and are making sure to introduce regular updates in order to make their threats almost undetectable by anti-malware solutions and very difficult to reverse engineer for cybersecurity experts.
The goal of the operations involving the Nautilus and Neuron malware is to steal sensitive data from the infiltrated system. Malware researchers are certainly going to have a hard time trying to combat this latest Turla APT campaign.
Do You Suspect Your PC May Be Infected with Nautilus & Other Threats? Scan Your PC with SpyHunterSpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Nautilus as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Security Doesn't Let You Download SpyHunter or Access the Internet?Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.