top of page

Sea Turtle

Mitre

Alias

Sea Turtle, Silicon, Unc1326, Marbled Dust

Country

Turkey

Sponsor

Nil

Motivation

Information Theft And Espionage

First Seen

2017

Description

(Talos) Cisco Talos has discovered a new cyber threat campaign that we are calling �Sea Turtle,� which is targeting public and private entities, including national security organizations, located primarily in the Middle East and North Africa. The ongoing operation likely began as early as January 2017 and has continued through the first quarter of 2019. Our investigation revealed that at least 40 different organizations across 13 different countries were compromised during this campaign. We assess with high confidence that this activity is being carried out by an advanced, state-sponsored actor that seeks to obtain persistent access to sensitive networks and systems.

The actors behind this campaign have focused on using DNS hijacking as a mechanism for achieving their ultimate objectives. DNS hijacking occurs when the actor can illicitly modify DNS name records to point users to actor-controlled servers. The Department of Homeland Security (DHS) issued an alert about this activity on Jan. 24 2019, warning that an attacker could redirect user traffic and obtain valid encryption certificates for an organization�s domain names.

Targeted
Industries

Aerospace, Defense, Energy, Government, Ngos, Think Tanks, Intelligence Agencies

Targeted
Countries

Albania, Armenia, Cyprus, Egypt, Greece, Iraq, Jordan, Lebanon, Libya, Sudan, Sweden, Switzerland, Syria, Turkey, Uae, Usa

Tools

Drupalgeddon
Dns Hijacking

TTP

Nil

Operations
Performed

[2018-01] talos Now Has Moderate Confidence That The Threat Actors Behind Sea Turtle Have Been Using Another Dns Hijacking Technique. This New Technique Has Been Used Very Sparingly, And Thus Far Have Only Identified Two Entities That Were Targeted In 2018, Though We Believe There Are Likely More.)

[2019-04] the Institute Of Computer Science Of The Foundation For Research And Technology � Hellas (ics-forth), The Cctld For Greece, Acknowledged On Its Public Website That Its Network Had Been Compromised On April 19, 2019. Based On Cisco Telemetry, We Determined That The Actors Behind The Sea Turtle Campaign Had Access To The Ics-forth Network. (https://blog.talosintelligence.com/2019/07/sea-turtle-keeps-on-swimming.html

Counter
Operations

Nil

Information

bottom of page