‘Red October’: Global cyber-spy network uncovered by Russian experts

‘Red October’: Global cyber-spy network uncovered by Russian experts

Published: 15 January, 2013, 05:56

A sophisticated cyber-espionage network targeting the world's diplomatic, government and research agencies has been uncovered by the Kaspersky Lab, whose experts say the malware's complexity could rival that of the notorious Flame virus.

­The system's targets include a wide range of countries, with the primary focus on Eastern Europe, former Soviet republics and Central Asia – although many in Western Europe and North America are also on the list.

In addition to attacking traditional computer workstations, Rocra – a shortened name for Red October, the name given the network by the Kaspersky team – can steal data from smartphones, dump network equipment configurations, snatch files from removable disk drives, including those that had been erased, and scan through email databases and local network FTP servers.  

Unlike other well-known highly automated cyber-espionage campaigns like Flame and Gauss, the Rorca's attacks all appear to be carefully chosen. Each operation is apparently driven by the configuration of the victim’s hardware and software, native language and even habit of document usage.

The information extracted from infected networks is often used to gain entry into additional systems. For example, stolen credentials were shown to be compiled in a list for use when attackers needed to guess passwords or phrases.

The hackers behind the network have created more than 60 domain names and several server hosting locations in different countries – the majority of those known being in Germany and Russia – which worked as proxies in order to hide the location of the “mothership” control server.

That server's location remains unknown.

Experts have uncovered over 1,000 modules belonging to 30 different module categories. While Rocra seems to have been designed to execute one-time tasks sent by the hackers’ servers, a number of modules were constantly present in the system executing persistent tasks. For example, retrieving information about a phone, its contact list, call history, calendar, SMS messages and even browsing history as soon as an iPhone or a Nokia phone is connected to the system.

The hackers' primary objective is to gather information and documents that compromised governments, corporations or other organizations and agencies. In addition to focusing on diplomatic and governmental agencies around the world, the hackers also attacked energy and nuclear groups and trade and aerospace targets.

No details have been given so far as to who the attackers could be. However, there is strong technical evidence to indicate that the attackers have Russophone origins, as Russian words including slang have been used in the source code commentaries. Many of the known attacks have taken place in Russian-speaking countries.

Views: 84

Reply to This

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted a blog post

The Reduction Principle Used for Centuries

 What is the reduction principle? Some call it the “De-Growth Movement” or “Depopulation Scheme”…See More
15 hours ago
Doc Vega posted blog posts
yesterday
Mr. Sizzle favorited Less Prone's video
Wednesday
tjdavis posted a photo
Tuesday
Doc Vega posted a blog post

The Saga of Joe Adams May Have Solved What's Behind the Numerous Disappearances Going on in our National Forests

     The year is 2023 in September. A nature’s photographer and experienced survivalist, Joe Adams…See More
Monday
Sandy posted a video

Aron Siri's opening statement, Senate Hearing on Covid Vaccines, May 25

Opening statement Aaron Siri, Managing Partner, Siri & Glimstad, L.L.P.Senate Homeland Security and Governmental Affairs, Permanent Subcommittee on Investiga...
Monday
cheeki kea replied to cheeki kea's discussion Tartaria
"A smidgeon of facts have come to light. In English a misspelling suddenly occurred where an extra R…"
Monday
Doc Vega posted a blog post

The Cancel Culture Vulture

  Better to shut them down than hear their point of viewCancel culture coming after youHelping to…See More
Saturday
Doc Vega posted a photo
Jul 11
Doc Vega posted a blog post

The Fingerprint

The Fingerprint On a dance with the unpredictability of the signals you sendA solemn pact with my…See More
Jul 11
Sandy posted a video
Jul 11
tjdavis posted a video
Jul 9
Burbia replied to Burbia's discussion Trump Receives Marching Orders
Jul 9
Less Prone favorited Burbia's video
Jul 9
Less Prone replied to Burbia's discussion Trump Receives Marching Orders
"Bullets can be effective in reinforcing ownership."
Jul 9
Burbia posted a discussion

Trump Receives Marching Orders

Netanyahu has made 3 visits to the White house since Trump's second term as President of the United…See More
Jul 9
Burbia commented on Burbia's video
Thumbnail

Ben Shapiro Just LOST HIS MIND — There's No Coming Back From This

"Omg. The Ben Shapiro voice that Luke is imitating here couldn't be any more comedic to…"
Jul 8
Burbia posted a video

Ben Shapiro Just LOST HIS MIND — There's No Coming Back From This

Get the magnesium your body needs - https://wearechange.shop/product/magnesium-glycinate/Ben Shapiro Just LOST HIS MIND — There's No Coming Back From ThisHig...
Jul 8
cheeki kea posted photos
Jul 8
Doc Vega posted blog posts
Jul 7

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted