March 21, 2024, 7:15 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

New details of the recently discovered TinyTurla-NG backdoor show that the implant uses the Chisel open-source attack framework as part of its post-compromise actions and uses two separate batch files to create a service for persistence on the compromised machine.


The TinyTurla-NG backdoor is a relatively new addition to the toolbox of the Turla APT group, a team that has been attributed to the Russian FSB and has been active for many years. Researchers from Cisco’s Talos Intelligence Team …

actions addition apt attack attack framework backdoor batch big capabilities chisel compromise compromised files framework implant machine persistence service tinyturla-ng toolbox turla

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineer - Vulnerability Management

@ Starling Bank | Southampton, England, United Kingdom

Manager Cybersecurity

@ Sia Partners | Rotterdam, Netherlands

Compliance Analyst

@ SiteMinder | Manila

Information System Security Engineer (ISSE)-Level 3, OS&CI Job #447

@ Allen Integrated Solutions | Chantilly, Virginia, United States

Enterprise Cyber Security Analyst – Advisory and Consulting

@ Ford Motor Company | Mexico City, MEX, Mexico