top of page
Mitre
Alias
Sea Turtle, Silicon, Unc1326, Marbled Dust
Country
Turkey
Sponsor
Nil
Motivation
Information Theft And Espionage
First Seen
2017
Description
(Talos) Cisco Talos has discovered a new cyber threat campaign that we are calling �Sea Turtle,� which is targeting public and private entities, including national security organizations, located primarily in the Middle East and North Africa. The ongoing operation likely began as early as January 2017 and has continued through the first quarter of 2019. Our investigation revealed that at least 40 different organizations across 13 different countries were compromised during this campaign. We assess with high confidence that this activity is being carried out by an advanced, state-sponsored actor that seeks to obtain persistent access to sensitive networks and systems.
The actors behind this campaign have focused on using DNS hijacking as a mechanism for achieving their ultimate objectives. DNS hijacking occurs when the actor can illicitly modify DNS name records to point users to actor-controlled servers. The Department of Homeland Security (DHS) issued an alert about this activity on Jan. 24 2019, warning that an attacker could redirect user traffic and obtain valid encryption certificates for an organization�s domain names.
Targeted
Industries
Aerospace, Defense, Energy, Government, Ngos, Think Tanks, Intelligence Agencies
Targeted
Countries
Albania, Armenia, Cyprus, Egypt, Greece, Iraq, Jordan, Lebanon, Libya, Sudan, Sweden, Switzerland, Syria, Turkey, Uae, Usa
Tools
Drupalgeddon
Dns Hijacking
TTP
Nil
Operations
Performed
[2018-01] talos Now Has Moderate Confidence That The Threat Actors Behind Sea Turtle Have Been Using Another Dns Hijacking Technique. This New Technique Has Been Used Very Sparingly, And Thus Far Have Only Identified Two Entities That Were Targeted In 2018, Though We Believe There Are Likely More.)
[2019-04] the Institute Of Computer Science Of The Foundation For Research And Technology � Hellas (ics-forth), The Cctld For Greece, Acknowledged On Its Public Website That Its Network Had Been Compromised On April 19, 2019. Based On Cisco Telemetry, We Determined That The Actors Behind The Sea Turtle Campaign Had Access To The Ics-forth Network. (https://blog.talosintelligence.com/2019/07/sea-turtle-keeps-on-swimming.html
Counter
Operations
Nil
Information
bottom of page