Turla turned Kazuar into a P2P botnet for stealthy, persistent control of hacked devices.
- Turla hackers linked to Russia’s FSB upgraded Kazuar backdoor
- New version runs as a modular P2P botnet for stealth access
- CISA warns the botnet targets government and private networks
Russian state-backed hackers known as Turla have quietly rebuilt their custom Kazuar backdoor into something far more dangerous: a modular peer-to-peer (P2P) botnet. The upgrade lets the group spread the malware faster, hide its tracks better, and keep infected machines under their control for much longer than before. U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed the change in a joint advisory with the FBI and international partners on Tuesday, warning that the revamped tool now targets government and private networks in the U.S. and Europe.
Kazuar isn’t new. Turla has used it since at least 2017 to break into Windows computers, steal data, and drop other malware. But the old version relied on direct command-and-control (C2) servers—easy for defenders to spot and block. The new P2P version ditches those servers entirely. Instead, infected machines talk to each other like a secret chat network, making it nearly impossible to shut down the botnet by taking out a single server. Each node in the network can relay orders, spread updates, and even heal itself if one machine gets cleaned up.
Security firm Kaspersky first spotted the shift in early 2024 during routine threat hunting. They found Kazuar’s code had been split into smaller, swappable modules. One handles spreading to new victims via phishing emails or stolen credentials. Another siphons off files or screenshots. A third quietly installs a backdoor that survives reboots. Kaspersky’s analysts say the botnet’s design shows Turla has been testing it in real attacks since late 2023, mostly hitting organizations in Germany, France, and Ukraine.
CISA’s alert names the upgraded malware Kazuar.P2P, and warns it’s now a preferred tool for Turla’s espionage campaigns. The group, tied to Russia’s Federal Security Service (FSB) via Center 16, has used Kazuar to spy on diplomats, military contractors, and even journalists. The P2P upgrade makes those operations harder to detect—and nearly impossible to dismantle once it’s running.
How the new Kazuar botnet spreads
Turla doesn’t just drop Kazuar.P2P through phishing anymore. The group has refined its playbook. First, they breach a network using stolen VPN credentials or a zero-day exploit in unpatched software. Once inside, they move laterally, stealing admin passwords and planting Kazuar on key servers. From there, the malware turns those servers into “seed nodes” that infect other machines in the same network. Each new victim joins the P2P swarm, helping spread the infection even if Turla’s initial foothold gets kicked out.
The botnet’s modular design is what makes it so hard to remove. Even if defenders detect and delete Kazuar from one machine, the malware can reinstall itself from another infected node. It also avoids leaving obvious traces. The P2P traffic looks like normal network chatter, and the malware encrypts its communications. Kaspersky found that Kazuar.P2P uses a custom encryption scheme based on elliptic curves—strong enough that even law enforcement wiretaps wouldn’t crack it without the right keys.
Why this matters now
This isn’t just another malware upgrade. Kazuar.P2P marks a shift in how state-backed hackers operate. By ditching traditional C2 servers, Turla has made its operations more resilient. Even if CISA or Europol seizes a server, the botnet keeps running. That means Turla can maintain access to compromised networks for years, quietly gathering intelligence or preparing for future attacks. The group has already used Kazuar in past campaigns to steal classified documents and monitor rival governments.
Defenders are scrambling to catch up. Kaspersky and other firms have released detection rules for Kazuar.P2P, but the malware’s stealthy design means many attacks still go unnoticed. Organizations are urged to audit VPN logs, enforce multi-factor authentication, and segment networks to limit lateral movement. CISA recommends treating any unpatched Windows server as a potential entry point for Kazuar.P2P.
Turla’s upgrade shows how quickly cyber threats evolve. The group has been active since the 1990s, and Kazuar.P2P proves they’re still refining their tools to stay ahead of defenses. For now, the botnet remains a quiet but growing threat—one that won’t be easy to shut down.
What You Need to Know
- Source: The Hacker News
- Published: May 15, 2026 at 17:10 UTC
- Category: Security
- Topics: #hackernews · #security · #vulnerabilities · #cybersecurity · #turla-turns-kazuar · #backdoor-into-modular
Read the Full Story
This is a curated summary. For the complete article, original data, quotes and full analysis:
All reporting rights belong to the respective author(s) at The Hacker News. GlobalBR News summarizes publicly available content to help readers discover the most relevant global news.
Curated by GlobalBR News · May 15, 2026
🇧🇷 Resumo em Português
Agora, hackers russos com laços com o FSB transformaram a backdoor Kazuar em uma perigosa e discreta botnet P2P, capaz de driblar defesas e manter acesso prolongado a sistemas infectados. Essa evolução da ferramenta, usada há anos por grupos como o Turla, representa um salto na sofisticação dos ciberataques patrocinados pelo Estado russo, colocando em alerta governos e empresas em todo o mundo.
No Brasil, onde os ataques cibernéticos já custam bilhões aos cofres públicos e privados anualmente, a notícia reforça a urgência de reforçar a segurança digital. Especialistas brasileiros alertam que a nova versão da Kazuar, agora com arquitetura P2P, dificulta ainda mais a detecção e a neutralização, exigindo investimentos em inteligência de ameaças e colaboração internacional. A adaptação de técnicas usadas por serviços de inteligência russos a novos alvos, incluindo infraestruturas críticas, coloca o país em uma posição vulnerável, especialmente em um cenário de eleições e tensões geopolíticas.
O fechamento desta investigação, liderada por pesquisadores da SentinelLabs, deve servir como um aviso para que organizações brasileiras revisem urgentemente suas defesas, pois a Kazuar P2P já pode estar operando sob o radar — e em solo nacional.
The Hacker News
Read full article at The Hacker News →This post is a curated summary. All rights belong to the original author(s) and The Hacker News.
Was this article helpful?
Discussion