FSB-Linked Russian Hackers Turla and Gamaredon Ally in Ukraine Cyberattacks

Russian hacking groups Turla and Gamaredon, both FSB-linked, are collaborating on cyberattacks against Ukraine, with Gamaredon providing initial access via phishing to deploy Turla's stealthy backdoors like Kazuar. This alliance enhances their espionage effectiveness and signals broader Russian cyber integration, urging global defenses to adapt.
FSB-Linked Russian Hackers Turla and Gamaredon Ally in Ukraine Cyberattacks
Written by Eric Hastings

Emerging Alliance in Russian Cyber Operations

In a revelation that underscores the evolving tactics of state-sponsored cyber threats, two prominent Russian hacking groups, Turla and Gamaredon, have been observed collaborating on operations targeting Ukrainian entities. According to a recent report by cybersecurity firm ESET, this partnership marks a significant shift, as these groups, both affiliated with Russia’s Federal Security Service (FSB), have historically operated independently. The collaboration involves Gamaredon, known for its aggressive and noisy phishing campaigns, aiding Turla in deploying sophisticated backdoors like Kazuar on compromised systems.

This joint effort was detailed in findings published by Ars Technica, which highlighted how Gamaredon’s initial access techniques are being leveraged to facilitate Turla’s more stealthy espionage activities. Researchers noted instances where Gamaredon’s malware infected devices, subsequently paving the way for Turla’s tools, indicating a division of labor that enhances their overall effectiveness against high-value targets in Ukraine.

Historical Context and Group Profiles

Turla, often tracked as Snake or Waterbug, has a long history of advanced persistent threats, focusing on diplomatic, military, and government sectors. Its operations date back over two decades, employing custom malware and zero-day exploits to maintain long-term access. Gamaredon, on the other hand, is recognized for its high-volume, less sophisticated attacks, frequently using spear-phishing to distribute malware like Pterodo.

As reported in Gagadget, the groups’ linkage to different FSB centers—Gamaredon to the 18th Center and Turla to the 16th—suggests a possible strategic alignment amid Russia’s ongoing conflict with Ukraine. This cooperation could signal a broader integration of Russian cyber capabilities, allowing for more resilient and multifaceted attacks.

Technical Details of the Collaboration

ESET’s analysis revealed specific overlaps, such as Gamaredon’s use of USB propagation and malicious documents to breach networks, followed by the installation of Turla’s Kazuar backdoor. This backdoor enables remote control, data exfiltration, and persistence, making it ideal for intelligence gathering. The report, echoed in Infosecurity Magazine, points to shared infrastructure and tactics that blur the lines between the groups’ operations.

Industry insiders note that this alliance amplifies the threat, as Gamaredon’s broad targeting creates entry points for Turla’s precision strikes. Such tactics have been observed in attacks on Ukrainian military and government systems, potentially aiming to disrupt communications and extract sensitive information.

Implications for Global Cybersecurity

The collaboration raises alarms for Western intelligence and cybersecurity firms, as it may indicate a trend toward more coordinated Russian cyber campaigns. ESET’s broader Threat Report for H1 2025 contextualizes this within a surge of Russian-linked activities, including destructive wipers deployed by groups like Sandworm.

Defenders are advised to enhance monitoring for indicators of compromise associated with both groups, such as unusual USB activity or phishing lures mimicking official documents. This development underscores the need for international cooperation to counter state-backed threats.

Broader Patterns and Future Outlook

Similar patterns have emerged in other reports, like Help Net Security, which confirms the FSB’s role in orchestrating these joint efforts. As geopolitical tensions persist, experts predict an escalation in such hybrid operations, blending cyber espionage with kinetic actions.

For organizations, particularly those in conflict-adjacent regions, investing in advanced threat detection and employee training is crucial. This alliance not only heightens immediate risks but also sets a precedent for how nation-state actors might pool resources in future confrontations, demanding vigilant and adaptive security postures from all sectors.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us