‘Red October’: Global cyber-spy network uncovered by Russian experts

‘Red October’: Global cyber-spy network uncovered by Russian experts

Published: 15 January, 2013, 05:56

A sophisticated cyber-espionage network targeting the world's diplomatic, government and research agencies has been uncovered by the Kaspersky Lab, whose experts say the malware's complexity could rival that of the notorious Flame virus.

­The system's targets include a wide range of countries, with the primary focus on Eastern Europe, former Soviet republics and Central Asia – although many in Western Europe and North America are also on the list.

In addition to attacking traditional computer workstations, Rocra – a shortened name for Red October, the name given the network by the Kaspersky team – can steal data from smartphones, dump network equipment configurations, snatch files from removable disk drives, including those that had been erased, and scan through email databases and local network FTP servers.  

Unlike other well-known highly automated cyber-espionage campaigns like Flame and Gauss, the Rorca's attacks all appear to be carefully chosen. Each operation is apparently driven by the configuration of the victim’s hardware and software, native language and even habit of document usage.

The information extracted from infected networks is often used to gain entry into additional systems. For example, stolen credentials were shown to be compiled in a list for use when attackers needed to guess passwords or phrases.

The hackers behind the network have created more than 60 domain names and several server hosting locations in different countries – the majority of those known being in Germany and Russia – which worked as proxies in order to hide the location of the “mothership” control server.

That server's location remains unknown.

Experts have uncovered over 1,000 modules belonging to 30 different module categories. While Rocra seems to have been designed to execute one-time tasks sent by the hackers’ servers, a number of modules were constantly present in the system executing persistent tasks. For example, retrieving information about a phone, its contact list, call history, calendar, SMS messages and even browsing history as soon as an iPhone or a Nokia phone is connected to the system.

The hackers' primary objective is to gather information and documents that compromised governments, corporations or other organizations and agencies. In addition to focusing on diplomatic and governmental agencies around the world, the hackers also attacked energy and nuclear groups and trade and aerospace targets.

No details have been given so far as to who the attackers could be. However, there is strong technical evidence to indicate that the attackers have Russophone origins, as Russian words including slang have been used in the source code commentaries. Many of the known attacks have taken place in Russian-speaking countries.

Views: 84

Reply to This

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega commented on tjdavis's video
Thumbnail

The Hunt - Official Trailer [HD]

"A former ANTIFA member was interviewed here recently and this would not be far from actual reality…"
yesterday
Doc Vega posted blog posts
yesterday
tjdavis posted videos
Monday
tjdavis posted a blog post
Monday
tjdavis posted a photo
Monday
Doc Vega posted a blog post

Legacy of Supposedly Inferior Aircraft Outmatching Their Enemies

 We think of the Korean War aerial combat as the classic dogfights between the American F-86 Sabre…See More
Saturday
Doc Vega commented on tjdavis's blog post Cities,States Without Limits
"This is just another form of a feudal globalism dictated by corporate technocrats bragging about…"
Saturday
Doc Vega favorited tjdavis's blog post Cities,States Without Limits
Saturday
Doc Vega posted a blog post

What is Area 2 and What Goes on There?

 We have all heard of Area 51 and S-4, along with such terms as Water Town, Papoose Lake,…See More
Friday
Doc Vega posted a blog post

STRANGE THINGS HAPPENING IN YELLOWSTONE

It’s not the fact that Yellowstone National Park sits atop a super volcano that hasn’t erupted in…See More
Thursday
tjdavis posted a video

Austrian police raid house of man who leaked Israeli ambassador video making genocidal comments

In a new ITV documentary, Breaking Ranks: Inside Israel’s War, former Israeli soldiers describe how Gaza civilians were killed, often without warning, in an ...
Nov 20
Burbia posted a video

WARHAMMER 40,000 | 1980's GRIMDARK MOVIE

WARHAMMER 40,000 | 1980's GRIMDARK MOVIEThis is a Concept Movie Trailer made with the help of AI. This video is created purely for fun and out of curiosity a...
Nov 19
tjdavis favorited Sandy's discussion Sick sci-fi sex fantasy written by Epstein's first benefactor people say inspired his twisted island... before author's SON ended up arresting him
Nov 19
tjdavis favorited Sandy's discussion Sick sci-fi sex fantasy written by Epstein's first benefactor people say inspired his twisted island... before author's SON ended up arresting him
Nov 19
tjdavis commented on tjdavis's blog post THE ORIGINS OF THE WORLD ASSOCIATION OF SOCIAL PSYCHIATRY IN LONDON, UK IN 1964
"Tavistock Timing"
Nov 19
tjdavis posted a blog post
Nov 19
Doc Vega posted a blog post

The Ringside View

Down in the streets where the animals meetWhere tear gas flies and people get beatWhere…See More
Nov 19
tjdavis posted videos
Nov 18
tjdavis posted blog posts
Nov 17
Doc Vega posted a blog post

Is America on the brink of a Dire Emergency

 You might know if you have remained informed that America has been under asymmetric warfare for…See More
Nov 15

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted