By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Online Tech Guru
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release
Reading: The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware
Best Deal
Font ResizerAa
Online Tech GuruOnline Tech Guru
  • News
  • Mobile
  • PC/Windows
  • Gaming
  • Apps
  • Gadgets
  • Accessories
Search
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release

Itch.io “re-indexes” free adult NSFW content, paid content to be “slowly” reintroduced

News Room News Room 1 August 2025
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow
  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Online Tech Guru > News > The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware
News

The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware

News Room
Last updated: 31 July 2025 17:06
By News Room 4 Min Read
Share
SHARE

The Russian state hacker group known as Turla has carried out some of the most innovative hacking feats in the history of cyberespionage, hiding their malware’s communications in satellite connections or hijacking other hackers’ operations to cloak their own data extraction. When they’re operating on their home turf, however, it turns out they’ve tried an equally remarkable, if more straightforward, approach: They appear to have used their control of Russia’s internet service providers to directly plant spyware on the computers of their targets in Moscow.

Microsoft’s security research team focused on hacking threats today published a report detailing an insidious new spy technique used by Turla, which is believed to be part of the Kremlin’s FSB intelligence agency. The group, which is also known as Snake, Venomous Bear, or Microsoft’s own name, Secret Blizzard, appears to have used its state-sanctioned access to Russian ISPs to meddle with internet traffic and trick victims working in foreign embassies operating in Moscow into installing the group’s malicious software on their PCs. That spyware then disabled encryption on those targets’ machines so that data they transmitted across the internet remained unencrypted, leaving their communications and credentials like usernames and passwords entirely vulnerable to surveillance by those same ISPs—and any state surveillance agency with which they cooperate.

Sherrod DeGrippo, Microsoft’s director of threat intelligence strategy, says the technique represents a rare blend of targeted hacking for espionage and governments’ older, more passive approach to mass surveillance, in which spy agencies collect and sift through the data of ISPs and telecoms to surveil targets. “This blurs the boundary between passive surveillance and actual intrusion,” DeGrippo says.

For this particular group of FSB hackers, DeGrippo adds, it also suggests a powerful new weapon in their arsenal for targeting anyone within Russia’s borders. “It potentially shows how they think of Russia-based telecom infrastructure as part of their toolkit,” she says.

According to Microsoft’s researchers, Turla’s technique exploits a certain web request browsers make when they encounter a “captive portal,” the windows that are most commonly used to gate-keep internet access in settings like airports, airplanes, or cafes, but also inside some companies and government agencies. In Windows, those captive portals reach out to a certain Microsoft website to check that the user’s computer is in fact online. (It’s not clear whether the captive portals used to hack Turla’s victims were in fact legitimate ones routinely used by the target embassies or ones that Turla somehow imposed on users as part of its hacking technique.)

By taking advantage of its control of the ISPs that connect certain foreign embassy staffers to the internet, Turla was able to redirect targets so that they saw an error message that prompted them to download an update to their browser’s cryptographic certificates before they could access the web. When an unsuspecting user agreed, they instead installed a piece of malware that Microsoft calls ApolloShadow, which is disguised—somewhat inexplicably—as a Kaspersky security update.

That ApolloShadow malware would then essentially disable the browser’s encryption, silently stripping away cryptographic protections for all web data the computer transmits and receives. That relatively simple certificate tampering was likely intended to be harder to detect than a full-featured piece of spyware, DeGrippo says, while achieving the same result.

Share This Article
Facebook Twitter Copy Link
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Vivobarefoot’s Sensus Shoes Are Like Gloves for Your Feet

News Room News Room 1 August 2025
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow

Trending

Microsoft is killing off Windows 11 SE, its Chrome OS competitor

Microsoft is ending support for Windows 11 SE next year, five years after it launched…

1 August 2025

Vivo V60 5G India Launch Date Set for August 12; Colour Options and Key Features Revealed

Vivo V60 5G will launch in India later this month, the company has confirmed. Alongside,…

1 August 2025

14 Great Couches You Can Buy Online

It’s hard shopping for an outdoor couch. You need to consider the material so that…

1 August 2025
Mobile

Samsung Exynos 2600 Confirmed to Be the First Chipset Built on 2nm GAA Process

Samsung's Exynos 2600 chipset is expected to debut soon as the successor to the Exynos 2500. The new chipset could be positioned as the company's next flagship mobile chipset, and…

News Room 1 August 2025

Your may also like!

News

Bing made Google dance and then stole some search traffic

News Room 1 August 2025
Gaming

EA Confirms Battlefield 6 Is Getting Battle Royale, Releases Chaotic Teaser Trailer

News Room 1 August 2025
Mobile

OnePlus 11 5G Gets New OxygenOS 15 Update in India With New Features, Latest Security Patch

News Room 1 August 2025
News

Confessions of a Recovering AI Porn Addict

News Room 1 August 2025

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site.

Read our privacy policy for more information.

Quick Links

  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
Advertise with us

Socials

Follow US
Welcome Back!

Sign in to your account

Lost your password?