ANALYTICAL BRIEFREF: ABTZ-0326-CY|SOURCE: OSINT / GOVERNMENT RECORDS
UPDATED 13 MAR 2026
OPERATION BUCKSHOT YANKEE

THE WORM THAT ATE THE PENTAGON

Agent.btz, Turla's FSB Hackers, and How a USB Drive in a Parking Lot Created US Cyber Command

SUBJECT Agent.btz / Turla APT
REGION Middle East / Russia / Global
PRIORITY HIGH
ANALYST OPEN SOURCE
STATUS HISTORICAL — LEGACY ACTIVE
MIDDLE EAST 2008 — Infected USB drive inserted into CENTCOM laptop at forward operating base ///Agent.btz worm spreads to SIPRNet (SECRET) and JWICS (TOP SECRET) networks — 300,000 computers infected ///Pentagon bans all USB drives and removable media across DoD — first time in history ///Operation Buckshot Yankee: 14-month cleanup operation across classified military networks ///Defense Secretary Robert Gates orders creation of US Cyber Command — June 2009 ///FBI/DHS formally attribute Agent.btz to Russian intelligence services — December 2016 ///Kaspersky links Agent.btz to Turla/Snake APT — FSB Centre 16 in Ryazan, Russia ///FBI Operation MEDUSA dismantles Turla's Snake malware network across 50 countries — May 2023 ///Turla (Secret Blizzard) still active in 2025 — targeting embassies in Moscow via ISP-level interception ///MIDDLE EAST 2008 — Infected USB drive inserted into CENTCOM laptop at forward operating base ///Agent.btz worm spreads to SIPRNet (SECRET) and JWICS (TOP SECRET) networks — 300,000 computers infected ///Pentagon bans all USB drives and removable media across DoD — first time in history ///Operation Buckshot Yankee: 14-month cleanup operation across classified military networks ///Defense Secretary Robert Gates orders creation of US Cyber Command — June 2009 ///FBI/DHS formally attribute Agent.btz to Russian intelligence services — December 2016 ///Kaspersky links Agent.btz to Turla/Snake APT — FSB Centre 16 in Ryazan, Russia ///FBI Operation MEDUSA dismantles Turla's Snake malware network across 50 countries — May 2023 ///Turla (Secret Blizzard) still active in 2025 — targeting embassies in Moscow via ISP-level interception ///

A USB DRIVE IN A PARKING LOT

US MILITARY BASE, MIDDLE EAST — OCTOBER 2008 | FOREIGN AFFAIRS / DOD

Foreign Intelligence Agency Breaches Most Classified US Military Networks via Infected USB Drive

In the fall of 2008, a USB flash drive containing malicious code was inserted into a laptop at a US military base in the Middle East. The laptop was connected to the United States Central Command (CENTCOM) network — the nerve center coordinating all US military operations in Iraq and Afghanistan.[1] The malware, later identified as Agent.btz, spread silently from that single insertion point across both classified and unclassified systems, penetrating the Secret Internet Protocol Router Network (SIPRNet) and the Joint Worldwide Intelligence Communications System (JWICS) — networks carrying SECRET and TOP SECRET material respectively.[2]

Deputy Secretary of Defense William J. Lynn III later described it as "the most significant breach of US military computers ever" in a landmark Foreign Affairs article that publicly acknowledged the incident for the first time.[1] The malware had been placed on the USB drive by a "foreign intelligence agency." The most persistent version of how it entered the network: an infected USB stick was left in a parking lot at a US military facility in the Middle East, picked up by an unsuspecting service member, and plugged into a classified terminal.[3] Whether that specific detail is apocryphal or literal, the vector was confirmed — and the consequences were historic.

SYSTEMS INFECTED
300,000
Computers across classified and unclassified DoD networks worldwide[4]
CLEANUP TIME
14 MONTHS
Pentagon spent nearly 14 months eradicating Agent.btz — Operation Buckshot Yankee[2]
NETWORKS BREACHED
3
NIPRNet (unclassified), SIPRNet (SECRET), and JWICS (TOP SECRET)[1]

This was the worst breach of U.S. military computers in history. And it served as a wake-up call.

— Deputy Secretary of Defense William J. Lynn III, Foreign Affairs, 2010[1]

ANATOMY OF THE WORM

Agent.btz was technically a variant of the SillyFDC worm — but purpose-built for espionage.[2] Written in x86-32 bit assembly language and compiled as a DLL file, it was lean, efficient, and designed for one thing: spreading via removable media across air-gapped networks that had no internet connection.[4] The worm created an AUTORUN.INF file on the root of every drive it touched, exploiting Windows' autorun feature to execute automatically when a USB device was inserted into a new machine.[5]

Sophistication in Context

Once resident, Agent.btz could scan the infected computer for data, open backdoors, and transmit stolen information to a remote command-and-control (C2) server.[2] On every USB drive it infected, it created a hidden file named "thumb.dd" — a CAB container storing encrypted log files ("winview.ocx", "wmcache.nld", "mswmpdat.tlb") about the infected system and the worm's activity.[6] This data could be exfiltrated either directly via internet connection or — critically for air-gapped networks — physically carried out on the same USB drives that spread the infection.

The encryption was not sophisticated by modern standards. Agent.btz used a static XOR key to encrypt its logs, a key that was publicly identified and published by security researchers in 2008.[6] The worm's power was not in cryptographic complexity but in its self-replicating persistence: it copied itself from drive to drive, machine to machine, exploiting the fundamental human behavior of sharing USB sticks in environments where internet transfer was impossible.

AGENT.BTZ VS THE PANTHEON

FINDING 01 // VS STUXNET (2010)

Stuxnet was orders of magnitude more sophisticated — a 500KB weaponized payload using four zero-day exploits, stolen Realtek and JMicron digital certificates, and precisely calibrated to destroy Iranian uranium centrifuges by manipulating Siemens SCADA controllers.[7] Agent.btz was a blunt instrument by comparison: a self-replicating worm with basic data exfiltration capabilities. But where Stuxnet was a surgical scalpel designed to destroy specific hardware, Agent.btz was a dragnet — built to spread as widely as possible and collect everything it could find. Different missions, different architectures.

FINDING 02 // VS TURLA/SNAKE (2004-2023)

Kaspersky's 2014 analysis revealed that Agent.btz shared identical log file names and the same XOR encryption key with Turla's flagship Snake malware.[6] Snake was vastly more advanced — a rootkit-based espionage platform using peer-to-peer covert communication networks, satellite link hijacking, and custom encryption protocols. Agent.btz appears to have been an early operational tool from the same development lineage that would later produce Snake. Think of it as a proof of concept that demonstrated USB-based air-gap crossing was viable — a lesson Turla's developers would refine for the next 15 years.

FINDING 03 // AI COMPLEXITY ANALYSIS

Could Agent.btz have been written with AI assistance? No. The worm was created circa 2006-2007, years before any meaningful AI code generation capability existed. Its assembly-language construction reflects traditional craft — the work of experienced malware developers writing efficient, low-level code by hand. The sophistication was operational, not algorithmic: understanding that USB drives were the weak point in air-gapped military networks required human intelligence tradecraft, not machine learning. Modern AI could trivially generate equivalent malware today — which is precisely why the defenses Agent.btz prompted remain critical.

TURLA — ADVERSARY NUMBER ONE

THREAT ACTOR PROFILE

Turla / Snake / Secret Blizzard — FSB Centre 16, Ryazan

Attribution of Agent.btz was contested for years. Initial suspicion fell on both Chinese and Russian hackers, since code elements from Agent.btz had appeared in prior attacks attributed to both nations.[8] The Economist noted in 2008 that "it is not clear that agent.btz was designed specifically to target military networks, or indeed that it comes from either Russia or China."[9] The Los Angeles Times reported it was "thought to be from inside Russia" but could not confirm government involvement.[10]

Resolution came in stages. In 2014, Kaspersky Lab published technical analysis linking Agent.btz to the Turla APT group through shared file names, encryption keys, and development patterns.[6] In December 2016, the FBI and DHS issued Joint Analysis Report JAR-16-20296A (GRIZZLY STEPPE), formally attributing Agent.btz to "one or more Russian civilian and military intelligence Services (RIS)."[11] And in May 2023, the FBI's Operation MEDUSA takedown of Snake malware explicitly linked Turla to Centre 16 of Russia's Federal Security Service (FSB) in Ryazan — the first official government attribution of the group.[12]

Turla is not a single tool but an operational lineage stretching back 25+ years. Western cybersecurity analysts consistently rank it as "adversary number one."[13] Its known history begins with Moonlight Maze (1996), the first documented nation-state cyber-espionage campaign against the United States, targeting Pentagon, NASA, and Department of Energy networks for over two years. Agent.btz (2008) was the second major documented Turla operation against US military systems. Snake (2003-2023) was the flagship — compromising targets in 50+ countries for two decades before the FBI dismantled it.[12]

The Innovation Timeline

What distinguishes Turla from other APT groups is not brute force but persistent technical innovation. Each era brought a new paradigm:

TURLA / SECRET BLIZZARD — 25 YEARS OF INNOVATION ──────────────────────────────────────────────────────────────── 1996-1998 MOONLIGHT MAZE First nation-state cyber-espionage against US government Targeted: Pentagon, NASA, DoE, universities Exfiltrated data estimated at "3x height of Washington Monument" 2006-2008 AGENT.BTZ USB worm targeting air-gapped military networks Vector: infected removable media → AUTORUN.INF Impact: 300,000 DoD computers, SIPRNet + JWICS breached Result: Creation of US Cyber Command 2003-2023 SNAKE / UROBUROS Premier espionage rootkit — peer-to-peer C2 network Infected: 50+ countries, NATO members, government targets Taken down: FBI Operation MEDUSA (May 2023) 2015 SATELLITE HIJACKING Hijacked satellite internet connections for C2 comms Cost: <$1,000/year — virtually untraceable 2019 IRANIAN APT HIJACKING Commandeered Iranian APT34 (Oilrig) infrastructure Used Iranian tools + C2 as false flag / force multiplier 2022 BOTNET HIJACKING (ANDROMEDA) Registered expired Andromeda botnet C2 domains Filtered 100s of infections for espionage-worthy targets 2024-2025 ISP-LEVEL INTERCEPTION (APOLLOSHADOW) Adversary-in-the-middle attacks on Moscow embassies Intercepted diplomatic traffic at ISP infrastructure level ──────────────────────────────────────────────────────────────── STATUS: ACTIVE — Microsoft reports ongoing operations as of 2025

The through-line from Agent.btz to ApolloShadow is clear: Turla has never stopped operating, and each generation of tooling is more sophisticated than the last. The FBI's 2023 takedown of Snake was a significant blow, but Turla simply pivoted to new infrastructure and techniques. As SentinelOne's Juan Andres Guerrero-Saade put it: "They're both innovative and pragmatic, and it makes them a very special APT group to track."[13]

Still Active: 2024-2025 Operations

In December 2024, Microsoft and Lumen's BlackLotus Labs reported Turla (Secret Blizzard) hijacking Pakistani APT infrastructure to spy on targets in Afghanistan and India — the same parasitic technique used against Iranian APT34 in 2019.[14] By mid-2025, Microsoft uncovered an ongoing campaign where Turla was conducting adversary-in-the-middle (AiTM) attacks at the ISP level against foreign embassies in Moscow, intercepting diplomatic communications using a new malware family called ApolloShadow.[15]

The group has also been observed deploying its Kazuar backdoor via the Amadey malware-as-a-service platform in Ukraine — piggybacking on cybercriminal infrastructure to target Ukrainian military and government systems during the ongoing conflict.[14] The pattern is unmistakable: Turla adapts, parasitizes, and persists. It is the oldest continuously operating state-sponsored cyber-espionage group in documented history.

    FROM BUCKSHOT YANKEE TO CYBER COMMAND

    The Agent.btz breach was not just a cybersecurity incident — it was an institutional earthquake. It exposed fundamental assumptions about air-gapped networks, forced a wholesale reorganization of military cyber capabilities, and directly created the organization that would later run offensive cyber operations against Venezuela and Iran.

    HIGH PROBABILITY

    Operation Buckshot Yankee (2008-2010)

    The Pentagon's immediate response. The military banned all USB drives and removable media across the entire Department of Defense — an unprecedented move affecting hundreds of thousands of personnel.[2] Windows autorun was disabled on all DoD systems. Thousands of infected USB drives were physically collected and destroyed. The cleanup took 14 months, during which network security protocols were rebuilt from the ground up.[2] NSA Director Keith Alexander was placed in charge of the response, giving the signals intelligence agency its first direct role in defending military networks.[16]

    HIGH PROBABILITY

    Creation of US Cyber Command (June 2009)

    Defense Secretary Robert Gates ordered the establishment of United States Cyber Command in June 2009, a direct consequence of the Agent.btz breach.[16] CYBERCOM was stood up as a sub-unified command under US Strategic Command, headquartered at Fort Meade alongside NSA. General Keith Alexander served as its first commander, dual-hatting as both NSA Director and CYBERCOM Commander — a structure that persists today. The command was tasked with defending DoD networks and, critically, conducting offensive cyber operations.[17]

    HIGH PROBABILITY

    CYBERCOM's Evolution to Offensive Operations (2018-2026)

    In 2018 — a decade after Agent.btz — President Trump elevated CYBERCOM to a full Unified Combatant Command and issued new authorities allowing offensive cyber operations without presidential approval for each action.[16] By January 2026, CYBERCOM's capabilities were deployed in Operation Absolute Resolve against Venezuela, where cyber operators helped disable air defense radar and cut power to Caracas.[18] In March 2026, CYBERCOM contributed to Operation Epic Fury against Iran, the largest AI-integrated military operation in history.[19] The organization born from a USB worm now runs nation-state offensive cyber warfare.

    MEDIUM PROBABILITY

    Air-Gap Doctrine Permanently Changed

    Agent.btz destroyed the assumption that air-gapped networks were inherently secure. Post-Buckshot Yankee, the DoD implemented strict removable media policies, endpoint detection on classified terminals, and network behavior monitoring that could identify worm-like lateral movement. These defenses would prove prescient — Stuxnet, discovered two years later, used the same USB vector to cross air gaps into Iranian nuclear facilities. The lesson: physical isolation is a security layer, not a security guarantee.

    VECTOR
    USB Flash Drive
    MALWARE
    Agent.btz Worm
    RESPONSE
    Buckshot Yankee
    RESULT
    US Cyber Command

    FROM USB WORM TO CYBER SUPERPOWER

    1996-1998
    Moonlight Maze. Proto-Turla hackers conduct the first documented nation-state cyber-espionage campaign, penetrating Pentagon, NASA, and DoE networks for over two years. Investigators estimate data stolen equals a stack of papers three times the height of the Washington Monument.[13]
    2006-2007
    Agent.btz created. First variants of the worm appear. F-Secure's Mikko Hypponen identifies it on military computers of a NATO government in June 2008 and names it Agent.btz. The malware had been circulating for months before detection.[20]
    OCT 2008
    CENTCOM breach. An infected USB drive is inserted into a laptop at a US military base in the Middle East. Agent.btz spreads across SIPRNet and JWICS — the first known malware to cross air-gapped classified military networks at this scale.[1] The NSA detects the beaconing.
    NOV 2008
    USB ban. Pentagon issues an emergency ban on all USB drives and removable media across the Department of Defense. Windows autorun disabled on all military systems. Operation Buckshot Yankee begins — the largest cyber-defense operation in DoD history.[2]
    JUN 2009
    CYBERCOM established. Defense Secretary Robert Gates orders the creation of US Cyber Command, directly citing the Agent.btz breach as the catalyst. General Keith Alexander named first commander.[16]
    MAY 2010
    CYBERCOM operational. US Cyber Command reaches full operational capability at Fort Meade, Maryland. The Pentagon publicly acknowledges the Agent.btz breach for the first time via Lynn's Foreign Affairs article.[1]
    MAR 2014
    Kaspersky connects the dots. Kaspersky Lab publishes technical analysis linking Agent.btz to Turla/Uroburos through shared file names (winview.ocx, wmcache.nld, mswmpdat.tlb), identical XOR encryption keys, and development timeline overlap. Agent.btz revealed as part of a larger Russian espionage ecosystem.[6]
    DEC 2016
    Formal attribution. FBI and DHS issue Joint Analysis Report JAR-16-20296A (GRIZZLY STEPPE), formally attributing Agent.btz to "Russian civilian and military intelligence Services."[11]
    MAY 2023
    Operation MEDUSA. FBI deploys custom tool PERSEUS to dismantle Turla's Snake malware network across 50+ countries. DOJ formally links Turla to FSB Centre 16 in Ryazan — first official government attribution to a specific Russian intelligence unit.[12]
    JAN 2026
    CYBERCOM in Venezuela. US Cyber Command deploys offensive capabilities in Operation Absolute Resolve, helping disable Venezuelan air defenses and infrastructure in the operation to capture Maduro.[18] The organization born from Agent.btz now conducts nation-state cyber warfare.
    MAR 2026
    CYBERCOM in Iran. Operation Epic Fury — the largest AI-integrated military operation in history — includes CYBERCOM cyber effects against Iranian military infrastructure.[19] Turla/Secret Blizzard continues operating in parallel, targeting embassies and military systems in Ukraine with new tooling.[15]

    BOTTOM LINE

    Agent.btz was the most consequential piece of malware in American military history — not because of its technical sophistication, but because of its strategic impact. A USB worm written in assembly language, using a static XOR key and Windows autorun to propagate, achieved what no adversary had before: penetrating the classified networks that coordinated two active wars. The response it provoked — Operation Buckshot Yankee, the USB ban, and ultimately the creation of US Cyber Command — fundamentally restructured how the United States defends and attacks in cyberspace.[1]

    The irony is striking. As Wired's Noah Shachtman reported in 2010, "The havoc caused by agent.btz has little to do with the worm's complexity or maliciousness — and everything to do with the military's inability to cope with even a minor threat."[2] The Pentagon's classified networks had no endpoint monitoring, no removable media controls, no behavioral analysis — they relied entirely on air-gap isolation as a security model. Agent.btz proved that model bankrupt. In doing so, it forced the creation of an institution that now runs offensive cyber operations against nation-states — from disrupting Venezuelan air defenses in Operation Absolute Resolve to supporting AI-integrated targeting in Operation Epic Fury.[18][19]

    The group behind Agent.btz — Turla, now tracked as Secret Blizzard — remains the longest-continuously-operating state-sponsored cyber-espionage group in documented history. From Moonlight Maze in 1996 to ISP-level interception of Moscow embassy traffic in 2025, they have never stopped. The FBI's 2023 Operation MEDUSA destroyed their Snake infrastructure, but Turla simply pivoted — hijacking botnets, parasitizing other APT groups' infrastructure, and deploying new malware families.[13][15] The adversary that created CYBERCOM is still operating. The question is no longer whether they're inside Western networks. It's how many networks they're in that we haven't found yet.

    Turla is really the quintessential APT. Its tooling is very sophisticated, it's stealthy, and it's persistent. A quarter-century speaks for itself. Really, it's adversary number one.

    — Thomas Rid, Professor of Strategic Studies, Johns Hopkins University, 2023[13]

    References & Source Material

    1. [1]William J. Lynn III, "Defending a New Domain: The Pentagon's Cyberstrategy," Foreign Affairs, September/October 2010
    2. [2]Noah Shachtman, "Insiders Doubt 2008 Pentagon Hack Was Foreign Spy Attack," Wired, 25 Aug 2010
    3. [3]Ellen Nakashima & Julie Tate, "Cyber-intruder sparks massive federal response — and debate over dealing with threats," Washington Post, 8 Dec 2011
    4. [4]"Agent.BTZ," Wikipedia — Technical description: DLL, x86-32 ASM, 300,000 computers infected
    5. [5]"Worm:W32/Agent.BTZ Description," F-Secure Labs — AUTORUN.INF propagation mechanism
    6. [6]Alexander Gostev, "Agent.btz: a Source of Inspiration?" Kaspersky Securelist, 12 Mar 2014 — Technical links to Turla/Red October/Flame
    7. [7]"Stuxnet," Wikipedia — Comparison: four zero-days, stolen certificates, SCADA targeting
    8. [8]John Leyden, "US Army bans USB devices to contain worm," The Register, 20 Nov 2008
    9. [9]"The worm turns," The Economist, 4 Dec 2008 — Ambiguity of Russia/China attribution
    10. [10]Julian E. Barnes, "Pentagon computer networks attacked," Los Angeles Times, 28 Nov 2008
    11. [11]NCCIC, "GRIZZLY STEPPE — Russian Malicious Cyber Activity," JAR-16-20296A, FBI/DHS, 29 Dec 2016
    12. [12]DOJ, "Justice Department Announces Court-Authorized Disruption of Snake Malware Network Controlled by Russia's Federal Security Service," 9 May 2023
    13. [13]Andy Greenberg, "The Underground History of Russia's Most Ingenious Hacker Group," Wired, 20 May 2023
    14. [14]"Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service," The Hacker News, Dec 2024
    15. [15]Microsoft Threat Intelligence, "Frozen in Transit: Secret Blizzard's AiTM Campaign Against Diplomats," Microsoft Security Blog, 31 Jul 2025
    16. [16]Eric Geller, "A decade after Russia hacked the Pentagon, Trump unshackles Cyber Command," Politico, 29 Nov 2018
    17. [17]"United States Cyber Command," Wikipedia — Establishment, structure, and operational history
    18. [18]"How Cyber Command contributed to Operation Epic Fury against Iran," Nextgov/FCW, Mar 2026
    19. [19]"US developed 'non-kinetic' cell ahead of Venezuela mission to push cyber operations," Nextgov/FCW, 28 Jan 2026
    20. [20]"Throwback Attack: An attack on the DoD leads to Operation Buckshot Yankee," Control Engineering, 9 Jan 2025 — F-Secure naming, 2006 creation date
    CONNECTIONS
    ZOOM OUT