DV Hardware - bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, hardware and technology!
   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
DarkVision Hardware - Daily tech news
July 13, 2020 
Main Menu
News archives

Who's Online
There are currently 130 people online.


Latest Reviews
Ewin Racing Flash gaming chair
Arctic BioniX F120 and F140 fans
Jaybird Freedom 2 wireless sport headphones
Ewin Racing Champion gaming chair
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset

Follow us

Red October malware lingers undetected on government networks for 5 years

Posted on Wednesday, January 16 2013 @ 11:31:43 CET by

DailyTech covers "Red October", a piece of highly-advanced malware that lingered undetected on on European and US government networks over the last half decade. The piece of malware is less advanced than Flame, but can still do plenty of things, including recovering deleted files from USB drives. It's unknown who is behind Red October, but security experts point out that China and Iran are the two most aggressive and sophisticated cyber-aggressors when it comes to attacking the US and its allies. There's strong technical evidence that the attackers have Russian-speaking origins, but the researchers point out that China often relies on hackers in Eastern Europe or Russia to do its "dirty work". Full details at DailyTech.
Much attention has been devoted of late to cyber-espionage efforts allegedly perpetrated by the U.S. and Israel. The Flame and Stuxnet campaigns against Iran captivated readers and infuriated supporters of the Islamist republic of Iran.

But with this new malware, which researchers have dubbed "Red October", the tables are turned U.S. and its allies are the targets.

To give one example of the sophistication of the multi-module attack package, if the user detects Red October and deletes it, a secondary hidden package can detect the deletion and carry out a protocol to reinstall the malware. The so-called "Resurrection Module" masquerades as plug-ins to Adobe Systems Inc.'s (ADBE) PDF Reader or Microsoft Corp.'s (MSFT) Office suite and is inactive until the malware is deleted.



DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2019 DM Media Group bvba