T
Turla
Russian Federal Security Service (FSB), Center 16
πŸ‡·πŸ‡Ί RussiaNation-State● ActiveG0010
Key Intelligence
MITRE ID
Country
πŸ‡·πŸ‡Ί Russia
Motivation
Espionage
Active Since
1996
Last Seen
2025
Techniques
27 across 11 tactics
Attribution
Russian Federal Security Service (FSB), Center 16
Also Known As
SnakeVenomous BearSecret BlizzardKRYPTONWaterbugIron HunterUroburosGroup 88BelugasturgeonPacifier APT
Target Profile
Targeted Industries
Government/DiplomaticMilitaryDefenseForeign AffairsResearch Institutions
Targeted Countries
🌍 Global (50+ countries)πŸ‡ΊπŸ‡Έ United StatesπŸ‡ͺπŸ‡Ί European UnionπŸ‡ΊπŸ‡¦ Ukraine

Overview

Turla is one of the oldest and most sophisticated Russian cyber espionage groups, attributed to the FSB's Center 16. Active since the mid-1990s, the group is known for its innovative techniques including satellite-based C2, hijacking other threat actors' infrastructure, and deploying rootkits. Turla's Snake malware network was dismantled by the FBI in 2023 via Operation MEDUSA, but the group continues to develop new capabilities.

Tools & Malware

Snake/UroburosCarbonKazuarComRATLightNeuronGazerCrutchTinyTurlaCapibarDeliveryCheckSnake Malware AdvisoryChisel

Malware & Tool Details

Arsenal attributed to Turla.

Attack Path Operation MEDUSA / Snake P2P

Following MITRE ATT&CK Flow methodology.

ATTACK FLOWOperation MEDUSA / Snake P2P8 steps | Drag nodes to rearrange

Diamond Model

Caltagirone, Pendergast & Betz (2013) | Drag to rearrange
ADVERSARY
FSB Center 16, operators in Ryazan, Russia. Snake active since 2003.
CAPABILITY
Snake/Uroburos rootkit, Carbon, Kazuar, ComRAT, LightNeuron, TinyTurla, Gazer
INFRASTRUCTURE
Global P2P Snake relay (50+ countries), hijacked satellite links, compromised embassies
VICTIM
Government/diplomatic in 50+ countries, NATO, US DoD, European foreign ministries

ATT&CK Navigator

Interactive MITRE ATT&CK Navigator layer for Turla (G0010).

Open Full Navigator

Known CVEs Exploited

CVEYearDescription
CVE-2013-50652013Windows NDProxy.sys privilege escalation
CVE-2014-17612014Word RTF RCE via spearphishing
CVE-2022-301902022Follina MSDT RCE in Ukraine campaigns

Notable Campaigns

2023
Operation MEDUSA
FBI disruption of Snake malware P2P network spanning 50+ countries.
2020
Iron Tiger/OilRig Hijack
Hijacking of Iranian APT infrastructure for own espionage operations.
2015
Satellite C2
First known use of satellite internet links for covert C2 communications.
2008
Agent.BTZ / Buckshot Yankee
Compromise of classified US military networks via USB worm.

Detection Engineering

Snake Rootkit Detection
Monitor for unsigned kernel drivers via Sysmon Event ID 6 (Driver Loaded). Detect named pipe patterns used by Snake (e.g., \\.\pipe\isarpc*). Deploy kernel integrity monitoring tools. The FBI released the PERSEUS tool specifically designed to detect and neutralize Snake installations.
View Detection Rule / Guide
LightNeuron Exchange Backdoor
Audit Exchange TransportAgent registry entries for unknown DLL assemblies. Monitor for emails being silently forwarded, modified, or blocked by transport rules not created by administrators. Check IIS logs for anomalous Exchange Web Services activity.
View Detection Rule / Guide
Infrastructure Hijacking Detection
Monitor for unexpected changes in DNS resolution for known C2 infrastructure of other threat actors. Turla has documented history of hijacking OilRig/APT34 C2 servers. Deploy DNS monitoring for infrastructure changes in threat intel feeds.
View Detection Rule / Guide

Related Threat Actors

Documented in MITRE ATT&CK, vendor intelligence, and government advisories.

Defense Recommendations

Mitigations with MITRE ATT&CK IDs. Click badges for implementation guidance.

Deploy kernel integrity monitoring. Turla Snake operates at kernel level and evades standard EDR.
CISA AA23-129A
Audit Exchange transport agents. Remove non-Microsoft agents. LightNeuron installs as transport agent.
ESET LightNeuron
Implement strict egress filtering. Allow only known protocols/destinations.
NIST SP 800-41
Review all mitigations in CISA AA23-129A for Snake malware detection and removal.
CISA/FBI Advisory

Attribution Confidence

High
Attribution
Confidence
Evidence Supporting Attribution
FBI/CISA Snake malware attribution to FSB Center 16
https://www.cisa.gov/news-events/cybersecurity-advisories/aa
DOJ disrupts Snake network via Operation MEDUSA
https://www.justice.gov/opa/pr/justice-department-announces-
ESET, Kaspersky, Symantec long-term tracking
https://securelist.com/the-epic-turla-operation/65545/

Threat Assessment

Capability10/10
Intent8/10
Targeting8/10
Critical
Overall Threat Level
Most technically sophisticated espionage actor. Kernel rootkit capability (Snake), satellite C2, and documented infrastructure hijacking of other APT groups.

Legal Actions & Sanctions

Recent Reporting

2023-05

Emulation Plans & Guidance

PlanSourceTypeDescriptionLink
MITRE CTID - Turla Full Emulation PlanMITRE CTIDOpen SourceComplete Turla emulation with Carbon and Snake P2P operationsOpen
ATT&CK Evaluations - Turla Round 5MITRE EngenuityFrameworkOfficial evaluation featuring Turla Carbon and Snake toolsetOpen
CISA Snake Malware AdvisoryCISA/FBIGuideTechnical advisory with detection guidance for Snake rootkitOpen
ATT&CK Evaluations - Turla Round 5MITRE EngenuityFrameworkOfficial Round 5 evaluation with Carbon backdoor and Snake rootkit emulation scenariosOpen
MITRE CTID - Turla Emulation PlanMITRE CTIDOpen SourceStep-by-step Carbon and Snake P2P operations with detection and protection scenariosOpen
Hunting Russian Intelligence Snake Malware (CISA AA23-129A)AttackIQBlog PostAttack graph response emulating Snake rootkit behaviors from CISA/FBI joint advisoryOpen

Page Contributors

Adversary Village
MITRE ATT&CK Team
BreachSimRange