

Turla ransomware is a Russian-linked cyber espionage group linked to high profile cyberattacks including Solarwinds and Starlink cyberattack, and the recent cyberattack on the Ukrainian military network.
In this Deep Dive podcast, we breakdown Turla ransomware and the methods they use to infiltrate the networks of their victims including exploiting unmatched vulnerabilities, spear phishing, remote execution, credential harvesting, network scanning and the command-and-control methods used by Turla ransomware.
Our experts will also analyze the techniques Turla ransomware uses including:
· Hybrid tactics involving tools like Amadey and custom backdoors.
· Infrastructure sharing with other cyber criminals.
· Custom malware deployment using malware such as KazuarV2.
The podcast will conclude with a discussion about the different mitigation measures that businesses can implement to prevent a Turla ransomware attack including endpoint detection and response (EDR) tools, network segmentation, zero trust architecture, threat intelligence, and air-gapped and immutable backups.
Also read: Turla Ransomware: Comprehensive Analysis of the Russian APT
Looking to protect your sensitive data from Turla ransomware? Talk to our experts today. Contact sales@stonefly.com or call +1 510 265 1616.
30 episodes
Turla ransomware is a Russian-linked cyber espionage group linked to high profile cyberattacks including Solarwinds and Starlink cyberattack, and the recent cyberattack on the Ukrainian military network.
In this Deep Dive podcast, we breakdown Turla ransomware and the methods they use to infiltrate the networks of their victims including exploiting unmatched vulnerabilities, spear phishing, remote execution, credential harvesting, network scanning and the command-and-control methods used by Turla ransomware.
Our experts will also analyze the techniques Turla ransomware uses including:
· Hybrid tactics involving tools like Amadey and custom backdoors.
· Infrastructure sharing with other cyber criminals.
· Custom malware deployment using malware such as KazuarV2.
The podcast will conclude with a discussion about the different mitigation measures that businesses can implement to prevent a Turla ransomware attack including endpoint detection and response (EDR) tools, network segmentation, zero trust architecture, threat intelligence, and air-gapped and immutable backups.
Also read: Turla Ransomware: Comprehensive Analysis of the Russian APT
Looking to protect your sensitive data from Turla ransomware? Talk to our experts today. Contact sales@stonefly.com or call +1 510 265 1616.
30 episodes
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.