Russiaβs Turla β the FSB-linked hacking group that Microsoft tracks as Secret Blizzard β has fundamentally rebuilt its flagship malware. What began as a monolithic backdoor called Kazuar is now a modular, peer-to-peer botnet engineered for long-term persistence in high-value networks. Microsoft published the anatomy of the new architecture on May 14, and it reads as a significant escalation in operational sophistication.
Turla is assessed to operate under FSB Center 16, making it one of Russiaβs most capable and well-resourced cyber units. Its target list spans European governments, defense ministries, embassies, and critical infrastructure across NATO member states.
From Backdoor to Botnet
The previous generation of Kazuar was a capable but relatively conventional implant β a single binary that communicated with command-and-control infrastructure and accepted tasking from operators. The new architecture discards that model entirely.
The rebuilt Kazuar deploys three distinct module types, each with a defined role:
Kernel β the core orchestrator. The Kernel module manages task queuing, coordinates communications between modules, and maintains operational state across reboots and sessions. It acts as the brain of the infected host, directing all other activity.
Bridge β the communications relay. The Bridge module is responsible for all external communication, acting as an intermediary between the Kernel and the attackerβs command infrastructure. Only Bridge-designated nodes talk outbound; other infected hosts never directly contact the C2 servers.
Worker β the execution layer. Worker modules handle specific tasking: file operations, credential collection, lateral movement, and exfiltration. The modular design allows operators to deploy only the capabilities they need on a given host, reducing the observable footprint.
Leader Election and P2P Silence
The most significant operational security innovation in the new Kazuar is its approach to C2 communication. Rather than allowing every infected host to phone home independently β a pattern that network monitoring can detect through volume and regularity β the botnet implements a leader election mechanism.
Among all infected hosts in a network, one system is designated as the βleader.β Only the leader communicates with the remote attacker infrastructure. All other infected hosts operate in silence, relaying tasking through the internal P2P mesh without generating any outbound C2 traffic. From a network monitoring perspective, the vast majority of infected machines look clean.
This design also provides resilience. If the leader host is remediated or taken offline, the botnet can elect a new leader from the remaining infected pool. Evicting Kazuar from a single machine doesnβt collapse the operation.
Communication Protocols and Evasion
The Bridge module supports three distinct communication protocols: HTTP, WebSockets, and Exchange Web Services (EWS). The EWS channel is particularly notable β it routes C2 communications through Microsoft Exchange infrastructure, blending malicious traffic with the legitimate mail platform traffic that most enterprise networks generate in high volume. Distinguishing Kazuarβs EWS-based C2 from normal Exchange activity is non-trivial.
Kazuarβs configuration system contains over 150 parameters controlling everything from persistence mechanisms and execution methods to exfiltration timing and detection evasion. The depth of that configuration space reflects an implant designed for long-term residency and fine-grained operational control.
The Pelmeni Dropper and Environment-Bound Payloads
Kazuar isnβt deployed directly. It arrives via Pelmeni, a dedicated dropper that embeds the encrypted second-stage payload as a byte array within the dropper binary itself. Critically, the payload is often bound to the target environment β encrypted using the victim machineβs hostname, so the payload decrypts and executes only on the intended host.
This environment-binding defeats a significant portion of automated malware analysis infrastructure. Sandboxes and detonation environments that donβt know the target hostname canβt decrypt the payload. The sample appears inert in analysis and yields nothing actionable.
Patchless AMSI and ETW Bypass
The Kazuar v3 loader bypasses two of the most common security telemetry mechanisms in Windows environments β AMSI (Antimalware Scan Interface) and ETW (Event Tracing for Windows) β without patching memory, a technique that modern EDR products specifically watch for.
Instead, the loader uses hardware breakpoints in combination with Vectored Exception Handling (VEH). By setting debug registers to intercept calls to AmsiScanBuffer and NtTraceControl, the loader transparently redirects execution without modifying any memory pages that integrity checks would flag. The bypass is invisible to memory scanning tools because nothing in memory has been altered.
A proof-of-concept reverse-engineered from the Kazuar v3 loader is already publicly available on GitHub, meaning defenders can now test their detection coverage directly.
What Microsoftβs Disclosure Means
Microsoftβs βKazuar: Anatomy of a nation-state botnetβ report is significant not just for the technical detail but for the timing. Publishing this level of architecture breakdown publicly is a deliberate act of disruption β forcing Turla to rotate infrastructure, rebuild detection evasion, and potentially retool the implant itself.
The practical takeaway for defenders is sobering. A network infected with Kazuar may show no outbound C2 traffic at all from most compromised hosts. Leader election means the infection can be widespread before any anomalous network behavior surfaces. Detection has to happen at the endpoint level, focusing on the specific AMSI/ETW bypass techniques, the Pelmeni dropperβs environment-binding behavior, and the presence of Kernel, Bridge, or Worker modules in memory.
Turla has been operational for over two decades. Kazuar has been in their toolkit since at least 2017. The P2P rebuild represents a serious investment in operational longevity β the group clearly intends Kazuar to remain viable for years, not months.
Sources:
- Microsoft Security Blog β Kazuar: Anatomy of a Nation-State Botnet
- The Hacker News β Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access
- GBHackers β Microsoft Exposes Kazuar Malwareβs Modular P2P Botnet Architecture
- CyberInsider β Microsoft: Russian Hackers Evolved Kazuar Malware Into Stealthy P2P Botnet
- GitHub β PatchlessEtwAndAmsiBypass (reverse-engineered from Kazuar v3)



