Russian spy groups Turla, Gamaredon join forces to hack Ukraine, researchers say

Researchers have uncovered what they say is the first documented collaboration in Ukraine between two of Moscow’s most notorious hacking groups — Turla and Gamaredon — both linked to Russia’s Federal Security Service (FSB).

Gamaredon, active since at least 2013 and believed to operate from the Russian-annexed Crimean peninsula, remains Ukraine’s most active state-sponsored threat actor, according to Ukrainian officials. It typically targets government services and defense enterprises. 

Turla, active since at least 2004, is known for sophisticated espionage operations against governments and diplomatic entities in Europe, Central Asia and the Middle East.

In February, Slovak cybersecurity firm ESET said it had detected four cases in which both groups compromised the same Ukrainian machines. Gamaredon deployed a range of its custom tools — including PteroLNK, PteroStew, PteroOdd, PteroEffigy and PteroGraphin — while Turla installed its Kazuar v3 backdoor.

In at least one case, researchers observed Turla remotely restarting its malware via a Gamaredon implant, effectively using its counterpart’s infrastructure as a support system. “This is the first time that we have been able to link these two groups together via technical indicators,” ESET said in a report on Friday.

While the initial method of compromise is unclear, Gamaredon is known for spearphishing and the use of infected removable drives, which researchers consider the most likely entry points.

Over the past year and a half, ESET said it detected Turla on seven Ukrainian machines, compared with hundreds or thousands compromised by Gamaredon. “This suggests that Turla is interested only in specific machines, probably ones containing highly sensitive intelligence,” researchers added.

It is not the first time Gamaredon has collaborated with another Russian-aligned actor. In 2020, researchers observed its infrastructure being used by the InvisiMole group. Turla, for its part, has a history of hijacking other groups’ infrastructure to infiltrate targets. ESET believes that Gamaredon appears to provide initial access to networks, which Turla then leverages to install its own implants.

According to researchers, the two FSB units commonly associated with Turla and Gamaredon have a long history of reported collaboration, which can be traced back to the Cold War era.

“In this context, it is perhaps not entirely surprising that APT groups operating within these two FSB Centers are observed cooperating to some extent,” ESET said.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware

Next Post

DOJ: Scattered Spider took $115 million in ransoms, breached a US court system

Related Posts

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

A recently disclosed security flaw impacting 7-Zip has come under active exploitation in the wild, according to an advisory issued by the U.K. NHS England Digital on Tuesday. The vulnerability in question is CVE-2025-11001 (CVSS score: 7.0), which allows remote attackers to execute arbitrary code. It has been addressed in 7-Zip version 25.00 released in July 2025. "The specific flaw exists
Read More

Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams

Meta on Tuesday said it's launching new tools to protect Messenger and WhatsApp users from potential scams. To that end, the company said it's introducing new warnings on WhatsApp when users attempt to share their screen with an unknown contact during a video call so as to prevent them from giving away sensitive information like bank details or verification codes. On Messenger, users can opt to
Read More