More about the WhiteBear campaign, its targets, techniques and tools involved
Please find more information here.
A second stage of the “Skipper Turla” operation active from February to September 2016. This operation—conducted by the threat actor Turla—targets embassies and consular operations around the world using compromised websites and hijacked satellite connections for command and control (C2) infrastructure. The exact method of distribution is unknown, but it’s likely the targets are spear-phished with malicious PDF files.