Tech content trusted by users in North America and around the world
6,685 Reviews & Articles | 45,701 News Posts

Kaspersky uncovers five-year cyber espionage network, makes the Flame malware look like a wimp

A five-year espionage campaign dubbed 'Red October' has been found by Kaspersky
| Hacking & Security News | Posted: Jan 15, 2013 7:32 am

Kaspersky of all companies have found something utterly shocking, an advanced cyber espionage network that makes last year's infamous Flame malware look like a joke. Dubbed Operation Red October, each attack is handcrafted for its victim in order to make sure it 100% works.

 

kaspersky_uncovers_five_year_cyber_espionage_network_makes_the_flame_malware_look_like_a_wimp_03

 

Red October has been hitting systems across the world since at least May 2007 and carefully chooses its victims spanning over two dozen countries who hold positions in government, military, aerospace, research, trade and commerce, nuclear, oil and other important, vital industries. Investigators aren't sure who is behind the attacks, but it is being reported that Chinese hackers may have created the exploit, while the various malware modules deployed seem to have been created by those who speak Russian.

 

Kaspersky can't put their finger on the source, as it is currently being run through at least two layers of proxy servers across Russia, Germany and Austria. Whoever is involved has some skill, as they've been silently sitting, unknown to the user, in major government and industry computers.

 

kaspersky_uncovers_five_year_cyber_espionage_network_makes_the_flame_malware_look_like_a_wimp_04

 

While this exploit has been going, the hackers involved have been using two different exploits through Microsoft Word and Excel to infect targets through spear phishing schemes. After the system had been infected, the attackers would take whatever data they could through a bunch of persistent and one-time tasks that would take place with over a thousand modules (malicious files).

 

kaspersky_uncovers_five_year_cyber_espionage_network_makes_the_flame_malware_look_like_a_wimp_05

 

This could include quickly grabbing information from USB drives, recording keystrokes, taking screenshots, retrieving email from Outlook and various mail servers, collecting browsing history and saved passwords, scanning networks to find more potential victims and much more. Who knows what the end goal of this was, but this information could easily be on the black market.

 

What I don't understand is Kaspersky found this, what the hell were the NSA, CIA, DHS and other various government agencies doing? They all had no idea their networks were infiltrated? I find this very hard to believe.

NEWS SOURCES:Techspot.com

Related Tags

Got an opinion on this news? Post a comment below!

Latest News Posts

View More News Posts

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases
Subscribe to our Newsletter
Or Scroll Down