Description

In a major ramping up of Russian cyber activity, two prominent state-sponsored hacking teams, Gamaredon and Turla, have been seen working together to introduce the sophisticated Kazuar backdoor to Ukrainian entities. It is the first reported instance of coordinated attack activity between FSB Centers 18 and 16, with Gamaredon leading off with its own implementation and Turla having used the advanced Kazuar malware. From February to June 2025, researchers saw Gamaredon's PteroGraphin and PteroOdd tools being utilized for reactivating or deploying Kazuar implants, indicating a strategic alliance. The latest version of the malware (Kazuar v3) comprises enhanced network features and modular design for stealth and robustness. This alliance indicates a strategic shift in Russian cyber spying by merging Gamaredon's large-scale access with Turla's precision targeting and technical prowess. Gamaredon widely infiltrates Ukrainian infrastructure, allowing Turla to surgically install Kazuar on high-value targets, including those of national defense or diplomacy. The common infrastructure (e.g., Telegra.ph, hijacked WordPress servers) and recovery processes indicate long-term planning and operational maturity. Turla's restraint—using Kazuar on only seven machines within 18 months—speaks to an intelligence-gathering objective that is high-value. Organizations with a focus on defense, government, and critical infrastructure should have layered detection controls, continuously scan for PowerShell abuse, and watch for anomalous traffic to identified C2 streams like Telegra.ph and compromised WordPress blogs. Patch frequently and employ network segmentation to restrict lateral movement after compromise. Threat intelligence groups should be looking for Kazuar-specific indicators and any intersection with known Gamaredon tooling to identify potential early-stage intrusions.