close
Gartner Report:
Innovation Insight for
Security Orchestration,
Automation and Response DOWNLOAD NOW

ThreatConnect Shares Incident Information on Turla APT satellite-based infrastructure

ThreatConnect identifies Turla APT satellite-based infrastructure

TIPper:  ThreatConnect identified Turla APT satellite-based infrastructure

ThreatConnect identified Turla APT satellite-based infrastructure from passive DNS overlaps with known Satellite Turla domains and IP resolution patterns.  Of particular note is the domain: norwaynews.mooo[.]com.

Incident Details  infrastructure from passive DNS overlaps with known Satellite Turla domains and IP resolution patterns

ThreatConnect has shared the associated indicators including hosts and an IP address in Incident 20161025B: Turla Satellite Infrastructure.

For additional details, current ThreatConnect users who have an organization account and have had a walkthrough can access this incident by selecting this LINK or by searching for incident “20161025B” in the ThreatConnect Platform.

If you do not have a ThreatConnect account, you can get access to this premium content by following these two steps: 1.) Sign up for a free Organization account. 2.) Get a walkthrough so that we can give you the best experience possible.

ThreatConnect’s Free Organization Edition allows you to establish a basic threat intelligence practice, collaborate with your internal team, protect your organization with open source threat data, bulk import cyberthreat indicators, contribute to the ThreatConnect Community, and receive support and validation from outside researchers and analysts also using the platform. The TIPper Community includes timely notification of threat incidents identified by the ThreatConnect Research team, an exclusive service offered at no additional charge to paying customers.

ABOUT THE AUTHOR

The ThreatConnect Research Team: is an elite group of globally-acknowledged cybersecurity experts, dedicated to tracking down existing and emerging cyber threats. We scrutinize trends, technology and socio-political motivators to develop comprehensive knowledge of the cyber landscape. Then, we share what we’ve learned so that you can protect your organization, and your team can take precise action against threats.