ESET Research has uncovered the first known cases of collaboration between Gamaredon and Turla. Both threat groups are associated with the main Russian intelligence agency, the FSB, and in tandem attacked high-profile targets in Ukraine. On the affected machines, Gamaredon deployed a wide range of tools, and on one of those machines, Turla was able to issue commands via Gamaredon implants.
Notably, in February 2025, ESET Research detected the execution of Turla’s Kazuar backdoor by Gamaredon’s PteroGraphin and PteroOdd on a machine in Ukraine. PteroGraphin was used to restart the Kazuar v3 backdoor, possibly after it crashed or was not launched automatically. Thus, PteroGraphin was probably used as a recovery method by Turla. This is the first time that anyone has been able to link these two groups together via technical indicators. In April and June 2025, ESET detected that Kazuar v2 was deployed using Gamaredon tools PteroOdd and PteroPaste.
Kazuar v3 is the latest branch of the Kazuar family, itself an advanced C# espionage implant that ESET believes is used exclusively by Turla; it was first seen in 2016. Other malware deployed by Gamaredon was PteroLNK, PteroStew, and PteroEffigy.
As already mentioned, both are part of the Russian FSB. According to Security Service of Ukraine, Gamaredon is thought to be operated by officers of Center 18 of the FSB (aka the Center for Information Security) in Crimea, which is part of the FSB’s counterintelligence service. As for Turla, the UK’s National Cyber Security Centre attributes the group to the Center 16 of the FSB, which is Russia’s main signals intelligence agency.
From an organizational perspective, it is worth noting that the two entities commonly associated with Turla and Gamaredon have a long history of reported collaboration, which can be traced back to the Cold War era. 2022’s full-scale invasion of Ukraine has probably reinforced this convergence, with ESET data clearly showing Gamaredon and Turla activities focusing on the Ukrainian defense sector in recent months.
Gamaredon has been active since at least 2013. It is responsible for many attacks, mostly against Ukrainian governmental institutions. Turla, also known as Snake, is an infamous cyberespionage group that has been active since at least 2004, possibly extending back into the late 1990s. It mainly focuses on high-profile targets, such as governments and diplomatic entities, in Europe, Central Asia, and the Middle East. It is known for having breached major organizations such as the US Department of Defense in 2008 and the Swiss defense company RUAG in 2014.
For a more detailed analysis and technical breakdown of Turla and Gamaredon’s interactions, check out the latest ESET Research blogpost “Gamaredon X Turla collab” on WeLiveSecurity.com
BlueCat appoints Kevin Shone as Chief Financial Officer
Posted in Commentary with tags BlueCat on September 24, 2025 by itnerdBlueCat today announced the appointment of Kevin Shone as its new Chief Financial Officer (CFO). Shone, who joined the company in August, will lead BlueCat’s financial strategy and oversee the company’s accounting, financial planning and analysis, legal, treasury, and IT functions.
With over two decades of financial leadership, Shone has held CFO positions at both public and private high-growth technology companies. Most recently, he served as CFO of Definitive Healthcare, where he guided the company through its successful IPO. His prior CFO experience includes Data Intensity, NextG Networks, and Unica. He spent a decade in senior leadership roles at Cognos Corporation, which IBM acquired for $4.9 billion in 2008. Shone began his career in corporate and tax law at Deloitte Touche and Riemer & Braunstein.
Over the past three years, BlueCat has made three strategic acquisitions while more than doubling its revenue and customer base. The Men & Mice, Indeni, and LiveAction additions have strengthened BlueCat’s portfolio and enabled the company to offer a comprehensive suite of Intelligent NetOps solutions to its customers.
Leave a comment »