Turkish hackers Sea Turtle expand attacks to Dutch ISPs, telcos

Turkish hackers Sea Turtle expand attacks to Dutch ISPs, telcos

January 8, 2024 at 03:46PM

Sea Turtle, a Turkish state-backed cyber espionage group, has expanded its spying campaigns to the Netherlands, targeting telcos, media, ISPs, and Kurdish websites. Using DNS hijacking and traffic redirection, they conduct man-in-the-middle attacks to acquire economic and political intelligence aligned with Turkish interests. Analysts at Hunt & Hackett observed these activities and recommend strict network monitoring and MFA to mitigate the threat.

Based on the meeting notes, the executive assistant’s generated clear takeaways are as follows:

1. Sea Turtle, a Turkish state-backed cyber espionage group, has expanded its spying campaigns to the Netherlands, targeting telcos, media, ISPs, IT service providers, and Kurdish websites.

2. The group uses known flaws and compromised accounts for initial access, and their recent attacks in the Netherlands have focused on acquiring economic and political intelligence aligning with Turkish interests.

3. Sea Turtle employs techniques such as DNS hijacking, traffic redirection, and the deployment of new tools like ‘SnappyTCP’ for persistence and data exfiltration.

4. To evade detection, the group overwrites system log files, unsets command and MySQL history files, and connects to compromised accounts using a VPN tool.

5. No cases of post-compromise credential theft, lateral movement attempts, or data manipulation/wiping have been observed in these attacks.

6. Recommendations for mitigating this threat include deploying strict network monitoring, enabling MFA on critical accounts, and reducing SSH exposure to the minimum required systems.

Overall, Sea Turtle’s moderately sophisticated techniques present a significant threat to organizations globally, and proactive measures such as those outlined in the recommendations are crucial for mitigating this threat.

Full Article