Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - We put the eek back in Geek.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » January 2013 » Red October closes as Kaspersky publishes more details

Red October closes as Kaspersky publishes more details


Contributed by: Email on 01/23/2013 03:43 PM [ comments Comments ]


Almost as soon as Kaspersky began publishing details about the Red October cyberespionage network, the command and control systems behind the apparently five-year-old digital spying ring began closing down. According to a posting on Kaspersky's threatpost, the researchers who exposed the network on Monday say that "not only [are] the registrars killing the domains and the hosting providers killing the command-and-control servers but perhaps the attackers shutting down the whole operation".

The second part of Kaspersky Lab's analysis of Operation Red October lays out the technical details of the large-scale cyberespionage campaign. In it, Kaspersky explains more precisely how the various modules worked together to steal data.

For example, the campaign was not limited to computers, but also stole data from mobile phones connected to those computers, with special tools for iPhones and Nokia smartphones. As soon as a smartphone was connected, the module searched for any photos, Office documents, voice recordings and other potentially interesting file types on the device. When a Windows Mobile smartphone was connected, the Trojan module even copied a spyware program onto it.

In addition, the perpetrators didn't only rely on a typical backdoor program, but also made use of an unusual arsenal, including plugins for Adobe's Acrobat Reader and Microsoft Office that anti-virus programs rarely detected. In this way, infected systems could easily be taken over again even after they had been cleaned with an anti-virus program: the victims were simply once again supplied with PDFs or Office files that hid malicious encrypted code. The plugins waited for the document to be opened and then decrypted and executed the malicious code.

Nevertheless, after its exhaustive analysis, Kaspersky Lab does not consider Operation Red October, which made use of the Sputnik family of malware, to be the most impressive espionage campaign it has seen. As Kaspersky security researcher Kurt Baumgartner told Ars Technica: "In my opinion, Flame is the queen mother of advanced attack methodology". Flame distinguishes itself among espionage Trojans, he explained, because of its unique man-in-the-middle manipulation of Microsoft's update system, allowing it to make its way from one infected computer to the next.

IT Pro Portal writes that, after five years undetected, Operation Red October (also known as "Rocra") was finally exposed because of human errors by its operators, leaving, for example, source code on infected sites. Kaspersky Lab says that it became involved because of a client request and set up test computers that, once infected, allowed it to take a close look at the campaign.






« Mega's first crypto faux pas · Red October closes as Kaspersky publishes more details · Plugin exploits can now win Pwn2Own prizes »




Comments
comments powered by Disqus

MajorGeeks.Com » News » January 2013 » Red October closes as Kaspersky publishes more details

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition