Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Gettin' Geeky with it.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » January 2013 » Operation Red October - large-scale cyber-espionage uncovered

Operation Red October - large-scale cyber-espionage uncovered


Contributed by: Email on 01/15/2013 03:45 PM [ comments Comments ]


Security experts at Kaspersky Lab have apparently uncovered a massive case of cyber-espionage. An analysis published on Monday states that computer networks in diplomatic missions, government and trade organizations, energy companies, and research, aerospace and military institutions have been infiltrated for an estimated five years. A sophisticated infrastructure appears to have enabled the unknown hackers to make off with terabytes of highly confidential geopolitical information and other data.

Kaspersky reports that it first found indications of the existence of the espionage infrastructure, designated "Red October" or "Rocra", in October. The investigation that followed uncovered hundreds of infections in major institutions worldwide. The organizations affected were primarily located in Eastern Europe, Central Asia and the former Soviet Union, with the largest number of infections being found in Russia, followed by Kazakhstan and Azerbaijan. The number of infections found in Western Europe and North America was low.

According to Kaspersky, the overall structure of Red October has a complexity comparable to that of Flame. The hackers controlled their network of infected computers from more than 60 domains and numerous servers located in various countries, but principally in Germany and Russia. The servers are, according to Kaspersky, organized in a chain with proxies downstream of the actual C&C servers to impede discovery of the location of the central control points. Registration data for the C&C domains and other information indicates that the attacks have been ongoing since at least May 2007. The system is apparently still active and data continues to be sent to the C&C servers.

The malware itself is similarly complex. The experts have identified more than 1000 files, in around 30 module categories, belonging to it. This setup allowed the hackers to take full advantage of the infections. As well as attacking workstations, the malware modules are able to steal data from mobile devices and tap into network components and local FTP servers. This allows emails to be accessed both locally and via POP or IMAP servers. The malware is also able to steal files, including ones that have been deleted, from USB drives, with Red October apparently using its own proprietary protocol to recover them.

The hackers appear to have used spear phishing techniques to initiate infections. Selected victims were sent emails containing infected attachments, with the attachments designed to be of maximum interest to the target. Following successful infection with the main malware component, further modules for purposes such as infecting the victim's smartphone were then silently downloaded from C&C servers. Security vulnerabilities in Microsoft Word, Microsoft Excel and Adobe Reader were among those exploited to infect victims' computers. According to Kaspersky's analysis, information obtained from infiltrated networks was systematically collated and used for subsequent attacks.

The online spies were particularly interested in files with the extension .acid, created by the program Acid Cryptofiler. According to Kaspersky, this is an encryption application used by organizations including the European Union and NATO.

The identity of those behind this major espionage campaign remains unclear. The Kaspersky team estimates the likelihood that the cyber-espionage has been financed by a single state as low. Certain clues, such as linguistic features in the code, point to the malware modules having been developed by Russian hackers. According to their analysis, the system was developed from scratch and has not been used in any other known case of cyber-espionage.






« Calls for internet law reform and open access after activist suicide · Operation Red October - large-scale cyber-espionage uncovered · Rubbing heroin on your baby's gums does not cure teething pain »




Comments
comments powered by Disqus

MajorGeeks.Com » News » January 2013 » Operation Red October - large-scale cyber-espionage uncovered

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition