Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Sky Sports killed off its female-focused Halo brand after just three days

    Sky Sports killed off its female-focused Halo brand after just three days

    November 16, 2025
    The best gifts for dads that have everything (but deserve more)

    The best gifts for dads that have everything (but deserve more)

    November 16, 2025
    The Asus Falcata is an ambitious split ergo gaming keyboard that falls short

    The Asus Falcata is an ambitious split ergo gaming keyboard that falls short

    November 16, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware
    Security

    The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware

    News RoomBy News RoomAugust 6, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware

    The Russian state hacker group known as Turla has carried out some of the most innovative hacking feats in the history of cyberespionage, hiding their malware’s communications in satellite connections or hijacking other hackers’ operations to cloak their own data extraction. When they’re operating on their home turf, however, it turns out they’ve tried an equally remarkable, if more straightforward, approach: They appear to have used their control of Russia’s internet service providers to directly plant spyware on the computers of their targets in Moscow.

    A Microsoft security research team focused on hacking threats today published a report detailing an insidious new spy technique used by Turla, which is believed to be part of the Kremlin’s FSB intelligence agency. The group, which is also known as Snake, Venomous Bear, or Microsoft’s own name, Secret Blizzard, appears to have used its state-sanctioned access to Russian ISPs to meddle with internet traffic and trick victims working in foreign embassies operating in Moscow into installing the group’s malicious software on their PCs. That spyware then disabled encryption on those targets’ machines so that data they transmitted across the internet remained unencrypted, leaving their communications and credentials like usernames and passwords entirely vulnerable to surveillance by those same ISPs—and any state surveillance agency with which they cooperate.

    Sherrod DeGrippo, Microsoft’s director of threat intelligence strategy, says the technique represents a rare blend of targeted hacking for espionage and governments’ older, more passive approach to mass surveillance, in which spy agencies collect and sift through the data of ISPs and telecoms to surveil targets. “This blurs the boundary between passive surveillance and actual intrusion,” DeGrippo says.

    For this particular group of FSB hackers, DeGrippo adds, it also suggests a powerful new weapon in their arsenal for targeting anyone within Russia’s borders. “It potentially shows how they think of Russia-based telecom infrastructure as part of their tool kit,” she says.

    According to Microsoft’s researchers, Turla’s technique exploits a certain web request browsers make when they encounter a “captive portal,” the windows that are most commonly used to gate-keep internet access in settings like airports, airplanes, or cafés, but also inside some companies and government agencies. In Windows, those captive portals reach out to a certain Microsoft website to check that the user’s computer is in fact online. (It’s not clear whether the captive portals used to hack Turla’s victims were in fact legitimate ones routinely used by the target embassies or ones that Turla somehow imposed on users as part of its hacking technique.)

    By taking advantage of its control of the ISPs that connect certain foreign embassy staffers to the internet, Turla was able to redirect targets so that they saw an error message that prompted them to download an update to their browser’s cryptographic certificates before they could access the web. When an unsuspecting user agreed, they instead installed a piece of malware that Microsoft calls ApolloShadow, which is disguised—somewhat inexplicably—as a Kaspersky security update.

    That ApolloShadow malware would then essentially disable the browser’s encryption, silently stripping away cryptographic protections for all web data the computer transmits and receives. That relatively simple certificate tampering was likely intended to be harder to detect than a full-featured piece of spyware, DeGrippo says, while achieving the same result.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleClaude Fans Threw a Funeral for Anthropic’s Retired AI Model
    Next Article Microsoft’s plan to fix the web with AI has already hit an embarrassing security flaw

    Related Posts

    Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan

    Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan

    November 15, 2025
    The Government Shutdown Is a Ticking Cybersecurity Time Bomb

    The Government Shutdown Is a Ticking Cybersecurity Time Bomb

    November 14, 2025
    Zohran Mamdani Just Inherited the NYPD Surveillance State

    Zohran Mamdani Just Inherited the NYPD Surveillance State

    November 12, 2025
    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    November 12, 2025
    FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

    FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

    November 7, 2025
    CBP Searched a Record Number of Phones at the US Border Over the Past Year

    CBP Searched a Record Number of Phones at the US Border Over the Past Year

    November 7, 2025
    Our Picks
    The best gifts for dads that have everything (but deserve more)

    The best gifts for dads that have everything (but deserve more)

    November 16, 2025
    The Asus Falcata is an ambitious split ergo gaming keyboard that falls short

    The Asus Falcata is an ambitious split ergo gaming keyboard that falls short

    November 16, 2025
    The Mysterious Math Behind the Brazilian Butt Lift

    The Mysterious Math Behind the Brazilian Butt Lift

    November 16, 2025
    Tim Cook could step down as Apple CEO next year

    Tim Cook could step down as Apple CEO next year

    November 15, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    The Razer Blade 14 Is Still One of the Best Compact Gaming Laptops Games

    The Razer Blade 14 Is Still One of the Best Compact Gaming Laptops

    By News RoomNovember 15, 2025

    The OLED looks great, but one of the benefits of OLED is HDR in gaming,…

    The Steam Machine feels like the TV gaming PC I’ve always wanted

    The Steam Machine feels like the TV gaming PC I’ve always wanted

    November 15, 2025
    Framework’s franken-laptop is back with big chip upgrades and familiar frustrations

    Framework’s franken-laptop is back with big chip upgrades and familiar frustrations

    November 15, 2025
    Pluribus’ third episode throws a bomb into things

    Pluribus’ third episode throws a bomb into things

    November 15, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.