Cyber Threats Threat Intelligence Reports

Sea Turtle APT Group

In this article, we will analyse an APT group that has attracted a lot of attention and has recently attracted attention for its activities: “Sea Turtle“.

Sea Turtle is known as a cyber espionage group of Turkish origin. An analysis will be made on their motivations, attack methods and potential effects. In addition, measures and defence strategies that can be taken against such threats will be discussed in order to contribute to the security knowledge base of infrastructures.

The threat group is also known under the names “Sea Turtle“, “Teal Kurma“, “Marbled Dust“, “SILICON” and “Cosmic Wolf“. They are estimated to be based in Turkey. It is known that they have been performing since 2017. At first, they started to make a name for themselves with DNS hijacking. In 2021, their activities in line with the Turkish strategic interests perspective have been identified by Microsoft under the SILICON designation. Although there is limited information about them based on limited sources, the activity flows of the group have been revealed by many organisations.

Their main motivation was seen to be targeting some organisations in Europe and the Middle East. It is known that terrorist organisations that pose a threat to Turkey (e.g. PKK), ISPs, IT service providers, Media and Entertainment organisations, telecommunication organisations are exposed to the activities.

The main activities carried out to these organisations can be defined as redirecting traffic to the websites of the relevant places and providing unauthorised access to some governments and organisational infrastructures. The previously mentioned attack target profiles were effective in the activities to identify the threat actor. The use of reverse shell for continuity in their activities caused the amount of data obtained to increase rapidly and enrich the variety of new targeting.

Some Techniques and Details of the Threat Group

1. Process that Starting with cPanel Access Violations

Discovered in early 2023. It targeted a web hosting platform used by organisations worldwide. When evaluated in a wide range, different orientations may have enabled this breach. Unauthorised access may have been enabled by exploiting 0-Days not reflected in security updates.

It was detected that a legitimate and authorised user was logged on to the platform through the IP range of an identified VPN provider. An SSH session was also opened over the same IP address. Subsequently, a WebMail session was also created using this account. Some time after the start of the operation, it was detected that another connection was accepted via the cPanel Web Disk feature. With this detection, we can see that the actor persistently utilised cPanel features during the operation.

Shortly after the related detections, it was observed that an Adminer tool was installed in the public directory of one of the cPanel accounts obtained for the purpose of MySQL management. It was determined that the same “Adminer” tool was also stored in the public Github repo, which was suspected to belong to the group hosting the SnappyTCP source code, which will be discussed shortly. A new cPanel account breach was detected a few weeks after the detected cPanel Web Disk connection, when a new cPanel account was logged into cPanel. In the same way, it was seen that a WebMail session was opened afterwards.

2. Activities over Secure Protocols to Avoid Tracking

We mentioned that SSH sessions are opened with the breached authorised users. If we talk about the most important advantages of this in the activity:

  • Providing a secure protocol infrastructure for Lateral Movement actions. It provides a secure protocol support for data communication after login. With the authorisation obtained, it allows silent lateral movement on the network.
  • It has been used for facilities such as persistence in the network by enabling authorisation upgrades. The channels used through SSH played an important role in data leakage activities in operations.
  • Activities could be diversified simultaneously by creating authorised SSH keys or using existing ones.

Following the accesses achieved by this APT group via cPanel, it was determined that they provided their first access in the IT environment via the relevant SSHs.

3. Activities through Backdoor Communication Channels

  • Backdoor activities were performed with SnappyTCP tool. It started by downloading the source code of this tool from the server with the address “193.34.167[.]245”. With the execution of the tool, an HTTP request is initiated with a URI containing “sy.php”. Backdoor activity is initiated with a verification mechanism through the request.
  • “X-Auth-43245-S-20” is expected in the header in the packet returned after the HTTP GET request. In addition, the packet size and the first character “@” are checked. Reverse shell access is provided with the IP/Port information returned from the server. If this process fails, the procedure is repeated after some sleep.
  • It is thought that the command and control (C&C) environment is configured in “socat” format. The command configuration in the traffic is characteristic of socat and is hosted on the same server (“.245/c00n/socat”). It was observed that requests made to the servers of the Sea Turtle group with “hxxp[//]193.34.167[.]245/c00n/socat” were mostly answered as “@8.8.8[.]8:443”.

Identification for Sea Turtle

AssociationsTeal Kurma, Marbled Dust, SILICON, Cosmic Wolf
TargetsGoverments, Terrorist Groups, Telecommunication, IT Providers, ISPs, Media & Entertainment Organisations, NGOs
Geo LocationsEurope, Middle East, North Africa
ActionsMiTM to harvest credentials for initial accessing, Valid encryption certificate theft, Redirecting legal website user traffic
Information GatheringReverse shell was utilized to obtain and export sensitive data.
MotivationActivities are believed to have been conducted in government and media outlets for the purpose of gathering political and economic intelligence.

TTPs

TacticTechniqueFindings
Resource developmentT1588.001Sea Turtle used the SnappyTCP malware, the source of which is available on GitHub.
Initial accessT1133 T1078.004Sea Turtle compromised cPanel accounts and used SSH to gain access to the IT infrastructure. 
ExecutionT1059.004Sea Turtle used the Bash Unix shell to execute malicious commands and the SnappyTCP malware.
Persistence T1505.003Sea Turtle executed SnappyTCP using the tool NoHup, which keeps the malware running on a system after exiting the shell or terminal, and installed Adminer in the public web directory of  a cPanel account.
Defense Evasion T1070.003 T1070.002Sea Turtle has reset the command (bash) and MySQL history file and overwritten Linux system logs.
CollectionT1114.001Sea Turtle created a copy of the email archive of a compromised cPanel account in the public web directory of a website accessible from the internet.
Command and ControlT1071.001 T1095Sea Turtle configured SnappyTCP to establish a command and control channel to the domain name forward.boord[.]info on port 443 using TCP and HTTP protocols.
ExfiltrationT1567Sea Turtle created a copy of the email archive of a compromised cPanel account in the public web directory of a website accessible from the Internet. It is highly likely that Sea Turtle exfiltrated the email archive by downloading the file from the website.

Indicators of Compromises

IoCType
aea947f06ac36c07ae37884abc5b6659d91d52aa99fd7d26bd0e233fd0fe7ad4SHA-256
ae89540cdfb11b0c9ebda8cfdf8f5e27ba8b729c46abc395a0e1e8bb99b00c54SHA-256
fb02a6ca9d4f80ba9832ca22eec4d58233929ad952805030fd9da276714dabcaSHA-256
d0a7d18e283f80d456ab57fe4d986ef1f020f9c3293ae640b7d8976a694c1757SHA-256
984f3e8af0c59cfa918319e3b813d75be4277a9765201bd14a9be9ee6b008d34SHA-256
86b13a1058dd7f41742dfb192252ac9449724c5c0a675c031602bd9f36dd49b5SHA-256
77a2466a89ed1d83c700d313395c4d10345d6d7f3e1fd294c6eb111b218422a3SHA-256
6b8a6c28f7a8df5e226ce853230bb667316e2eae136e64edd6e44f5648683f11SHA-256
67647f0226e29ada304e476d4e9d35b4ac916c584b1768eb5127bd0df1818707SHA-256
6650c6971d6e7927efad09b215426a442c6342dd22f073972021d8e81a3ba124SHA-256
47c4e2c71e5caa2e0aeb3ed7a3f0d2c482c6acc19e82bac5d7821aa6ef9e735aSHA-256
405b2c867408f4dc6583109cbc21bac0e78f2f0e6c45013d1c9811a6f0b99a81SHA-256
3c9e4ba1278b751c24f03ba39cb317b1bc51d2dc5173b0a0b201bc62fdc2c6fdSHA-256
1695a1adb142d4da4830654c72796fc33d1e8ab9af03de85b7d6ef3e959985abSHA-256
15528410418d246a085044c67f431397d159d64003f13145b68287e7a68e805aSHA-256
29f82ca8b268b1b74e22e05ef85e64cf7cf96751e494a07fe8ef96046e39dc26SHA-256
293703318fab4ad56124d37e6c93d1aecbce4c656782c40fce5d67f3b4149558SHA-256
276b1cecbd4ab24bbd47c23558143bdf905440c7045a7ff46a49d80b341c2cd5SHA-256
30eb5c522a29a1aad4c55cccadcbfd335beed648904f13b25379f23536404803SHA-256
1ac0b2e91ba3d33ed6b8cd90f5c1f63454bfdf7aad7dbf4f239445f31dfc6eb5SHA-256
ddcc23f81362bb394e0ee66fda549a1523860b3bSHA1
da64b83c2998212bbf77862e17d3564a0745f222SHA1
d4ca42e06e5803a5c3bf35c52c0a7b9408356ac3SHA1
c8d8a7bfe27be6087685495726593d7f6168e94cSHA1
c418180c7233233364bb223a2ba621b167bfb503SHA1
c17928c00a9dad1a6455eaa490355dd311f6d88fSHA1
bce355f628fcd7aec82a2f33e8af3bd87b6a33d8SHA1
ae78ba9e5dad29ac910996a0c5d34684cedfe3f7SHA1
9c3f19a8a0824fc9745b5b8dd86f660a1e186d52SHA1
922bab717a9b21dc3510ba96e0c3e4a93296e934SHA1
87f4775c29b47617c0fefa984bb342a79c0ba02dSHA1
700d2c7e00df8249e61ccda1fcf6f1f235dc6d23SHA1
826fe3ed0a75f5c7f093451e11588d07ff90ac81SHA1
7f8ed51d632738e3523a94ba5f94b997e922e9feSHA1
450431fd6561ea4cbb853762163f7a1544d562b8SHA1
3a5fe689d7f0ee374b1ef0b9227aecae56925e84SHA1
6557106402d71958aac007940a6cdd934e0b2336SHA1
6487e320b6294669604a61866b29ce78c3f34e69SHA1
600a3f64a619db97457231b2e654d5b4a794d2f8SHA1
f1a4abd70f8e56711863f9e7ed0a4a865267ec7SHA1
514e02418468dfcad702b0e0be22fb8f9a5366bcSHA1
d036adb864e46ad88dd2c1dbca62137aMD5
c7e99654250bf4e3286c3ea7547a62feMD5
9ac96799b2b7a376c7a7fc3c76322556MD5
9a56d56aa24ccc75ef5709747ec5ca8bMD5
bb7cd2dc1dd3bcd6932a6e75a1c95afeMD5
f17985bdc165388476dd228eb927d632MD5
e69541dd97e4d4abfa33d5d4907412c6MD5
e3e4b90f9ebe829ab323e68139becf0cMD5
d2a8ec0f0c4f2f015830788cec54c67fMD5
4b8ac8f2d517cd9836a2578cae47fe8dMD5
6f20fdd1fd6c133ef575bd36437578cfMD5
2352627014f80918dde97aad963c5cf2MD5
2a684c83401ec4706f81bf4a3503e096MD5
19021c37d8adda5fa509dd242629cd50MD5
122b56b4474f93d496dee79d939c58f4MD5
102d8524f21d1b6b0380c817a435e9a7MD5
8e08c7c440bf9f5380dd614238fa2d38MD5
80aa20453ca295467bff3f8708a06280MD5
7d0d50de5aa34f7a0e8cffe06f50a5fbMD5
8640f22e5a859ea2216d0e9dacef4f50MD5
185.158.248[.]8ip
108.61.103[.]186ip
87.120.254[.]120ip
206.166.251[.]163ip
88.119.171[.]248ip
31.13.195[.]52ip
168.100.8[.]245ip
31.214.157[.]230ip
168.100.9[.]203ip
45.80.148[.]172ip
eth0[.]secrsys[.]netdomain
168.100.10[.]187ip
hxxp://108.61.103[.]186/sy.phpurl
93.115.22[.]212ip
199.247.29[.]25ip
hxxp://lo0[.]systemctl[.]network/sy.phpurl
95.179.176[.]250ip
al-marsad[.]codomain
alhurra[.]onlinedomain
lo0[.]systemctl[.]networkdomain
146.190.28[.]83ip
anfturkce[.]newsdomain
nmcbcd[.]livedomain
aws[.]systemctl[.]networkdomain
querryfiles[.].comdomain
systemctl[.]networkdomain
dhcp[.]systemctl[.]networkdomain
ud[.]ybcd[.]techdomain
upt[.]mcsoft[.]orgdomain
ybcd[.]techdomain
exp-al-marsad[.]codomain
93.123.12[.]151ip

Author

Cyberthint

Cyberthint is an unified cyber threat intelligence platform. Everything you need is on a single platform! With Cyberthint, you can monitor and identify advanced threats and take early action.

Leave a comment

Your email address will not be published. Required fields are marked *