Sign up for our daily briefing
Make your busy days simpler with Axios AM/PM. Catch up on what's new and why it matters in just 5 minutes.
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Denver news in your inbox
Catch up on the most important stories affecting your hometown with Axios Denver
Des Moines news in your inbox
Catch up on the most important stories affecting your hometown with Axios Des Moines
Minneapolis-St. Paul news in your inbox
Catch up on the most important stories affecting your hometown with Axios Twin Cities
Tampa Bay news in your inbox
Catch up on the most important stories affecting your hometown with Axios Tampa Bay
Charlotte news in your inbox
Catch up on the most important stories affecting your hometown with Axios Charlotte
Russian President Vladimir Putin and Iranian President Hassan Rouhani at a meeting in Armenia in early October. Photo: Mikhail Metzel/TASS via Getty Images
U.S. and U.K. intelligence agencies confirmed Monday that the Russian espionage hacker group Turla used tools and infrastructure from Iranian espionage group OilRig, likely without the Iranian group's knowledge.
Why it matters: Moves like this can sometimes confound efforts to understand who exactly has spied on what. And, by monitoring malware implanted by Iran, Turla saved itself the effort of hacking targets directly.
- The backdrop: OilRig traditionally spies on Middle Eastern targets. Turla, whose operations are more global in nature, is only known by the NSA and NCSC to have used OilRig malware when spying on Middle Eastern targets.
Details: An investigation by the NSA and the U.K.'s lead cybersecurity intelligence agency details that malware that Turla has used since at least 2017 was "very likely Iranian in origin," according to a report released by the U.K.'s National Cyber Security Centre.
- OilRig was "almost certainly not aware of, or complicit with, Turla’s use of their implants," according to the report.
- More than just re-appropriating malware, it appears Turla piggy-backed on OilRig's control infrastructure and even used the malware implanted by the OilRig hackers to do its own espionage.
- Turla's use of OilRig hacking infrastructure was first reported by Symantec in June.
- The NSA and NCSC are the first to note that the malware tools Nautilus and Neuron, once thought to be from Turla, are actually from Iran.
The bottom line: In one fell swoop, the Western allies have left egg on the faces of both Iran and Russia, two key rivals in the cyber domain.