DV Hardware - bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, hardware and technology!

   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
 
DarkVision Hardware - Daily tech news
November 17, 2018 
Main Menu
Home
Info
News archives
Articles
Howto
Reviews
 

Who's Online
There are currently 174 people online.

 

Latest Reviews
Arctic BioniX F120 and F140 fans
Jaybird Freedom 2 wireless sport headphones
Ewin Racing Champion gaming chair
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset
Lamptron FC-10 SE fan controller
 

Follow us
RSS
 

Red October malware lingers undetected on government networks for 5 years

Posted on Wednesday, January 16 2013 @ 11:31:43 CET by


DailyTech covers "Red October", a piece of highly-advanced malware that lingered undetected on on European and US government networks over the last half decade. The piece of malware is less advanced than Flame, but can still do plenty of things, including recovering deleted files from USB drives. It's unknown who is behind Red October, but security experts point out that China and Iran are the two most aggressive and sophisticated cyber-aggressors when it comes to attacking the US and its allies. There's strong technical evidence that the attackers have Russian-speaking origins, but the researchers point out that China often relies on hackers in Eastern Europe or Russia to do its "dirty work". Full details at DailyTech.
Much attention has been devoted of late to cyber-espionage efforts allegedly perpetrated by the U.S. and Israel. The Flame and Stuxnet campaigns against Iran captivated readers and infuriated supporters of the Islamist republic of Iran.

But with this new malware, which researchers have dubbed "Red October", the tables are turned U.S. and its allies are the targets.

To give one example of the sophistication of the multi-module attack package, if the user detects Red October and deletes it, a secondary hidden package can detect the deletion and carry out a protocol to reinstall the malware. The so-called "Resurrection Module" masquerades as plug-ins to Adobe Systems Inc.'s (ADBE) PDF Reader or Microsoft Corp.'s (MSFT) Office suite and is inactive until the malware is deleted.




 



 

DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2018 DM Media Group bvba