Jump to content


New Red October Malware Has Been in Hiding for 5 Years

october red hunt malware virus kaspersky classified

  • Please log in to reply
4 replies to this topic

#1 Gerowen


    Neowinian Senior

  • 3,706 posts
  • Joined: 28-August 05
  • Location: Hills of Kentucky
  • OS: Ubuntu Linux

Posted 17 January 2013 - 04:10

Kind of scary if you think about it, the amount of stuff out there that nobody knows exists.

Source: http://gizmodo.com/5...-in-the-shadows
Image courtesy of: http://www.securelis...rnment_Agencies

Meet Red October: The Global Cyber-Espionage Ring That Spent 5 Years in the Shadows

There are plenty of cyberweapons floating around out there, like Stuxnet, Flame, and that whole gang. Now, Kaspersky has turned up a cyber-espoinage operation its dubbed "Red October," and it's up there in the big leagues. But unlike its cohorts, it doesn't look state-sponsored. This is a freelance job, and it's professional grade.

While Red October has only recently been discovered, it's been working behind the scenes for a long time. According to its domain names and various details dug up from the executable code, it's been doing its thing since 2007, if not earlier. And what is its thing? Harvesting loads of classified information from high-profile targets across the globe—including the United States, but mostly in Eastern Europe and Central Asia. And it's got quite the stash.

Red October has been infecting targets through vulnerabilities in MS Word and MS Excel. Once there's a foothold, the infected devices call back to command servers for customized packages of malware signed with victim-specific 20 digit codes. From there, it collects data straight from government institutions, embassies, research firms, military installations, and energy providers, nuclear and otherwise. Over the past half-decade, Red October has been able to dive deeper and deeper into classified intel by using its ever-growing store of pilfered credentials, logins, and other handy tidbits to intelligently guess its way through security.

Part of the reason it's especially dangerous is that it's not confined to infecting, stealing from, and keylogging workstations. The malware also has to capability to get into mobile phones (iOS, Windows Mobile, and Nokia) connected to infected machines and snag a copy of their contacts, calls, messages, and browsing history. It can also scrub enterprise network equipment and removable disk drives, copy entire email databases from Outlook storage and POP/IMAP servers, and it can even take deleted files off USB sticks using its own recovery mechanism. Red October doesn't mess around.

What it can get is one question, but who it's run by is a very different one. According to Kaspersky the exploits are probably Chinese in origin, and Russian slang in some of the code implies the operators speak Russian. Or they're running an in-depth long-con to make people think they do. Most of the command & control servers and domains that can be found are located in and around Germany and Russia, but an intense chain of proxies is still effectively masking the operation's real home base. And while it rivals state-sponsored projects in size and complexity, its never been known to tangle with or team up with them in any way. Red October is a solitary hoarder, sitting in some cyber-shack alone, surrounded by heaps of top secret info.

Likewise, it's still up for grabs what all this espionage is for. There's no evidence to suggest this is a state-sponsored affair, and it seems to be just trucking along, collecting as much classified information as possible just to have it around. Infections are most prominent in Russia (35 infections) but Afghanistan (10), Iran (7), the United States (6), and even Switzerland (5) are on the map as well. But there's no telling what's been done with any info. It could be being sold, acting on in some covert way, or just stockpiled for the right moment for...something.

It's hard not to imagine a man sitting behind a large desk, his face obscured by shadow, tapping his fingers and chuckling to himself sinisterly, watching his own private store of the world's confidential information grow before his very eyes as he ponders what do with it all. And that might not be too far off from the truth. This isn't just a game for nation-states to play; it looks like there's a free agent in the mix, and he/she/they/it/ is every bit as competent as the big names.
Posted Image

#2 Obi-Wan Kenobi

Obi-Wan Kenobi

    "You were the chosen one!"

  • 3,115 posts
  • Joined: 11-November 02
  • Location: West-Central Texas

Posted 17 January 2013 - 04:32

aww dang! this can't be good...

#3 Aheer.R.S.


    I cannot Teach Him, the Boy has no Patience!

  • 13,632 posts
  • Joined: 15-October 10
  • Location: Wolverhampton, West Midlands

Posted 17 January 2013 - 04:43

Well, send in Alec Baldwin

#4 Nothing Here

Nothing Here

    Neowinian Senior

  • 2,164 posts
  • Joined: 23-February 08
  • Location: California, U.S.A.
  • OS: Windows 8 Pro / Kororaa 17

Posted 17 January 2013 - 05:01

Funny thing, nothing about China..........

#5 HoochieMamma


    Professional Hoochie™

  • 8,863 posts
  • Joined: 31-August 03
  • Location: Melbourne, AU
  • OS: Windows 7
  • Phone: Nexus 5

Posted 17 January 2013 - 05:29

Funny thing, nothing about China..........

Or Canada.....just sayin' :shifty: