According to different sources, the Turla group is carrying out several attack campaigns. The first campaign has been discovered by ESET researchers where the objectives are embassies and consulates belonging to the former Soviet Union. According to ESET reports, they do not know with certainty what the attack vector is, although the infection seems to be related to a malicious Adobe Flash executable.
The second campaign was discovered by the NCSC "National Cyber Security Center" that identified a new version of the Neuron malware used by the Turla group to infect different computers with the Microsoft Windows operating system. According to the NCSC, the objective of this fraudulent campaign is the United Kingdom.