NATO Computers Infiltrated by "Red October" Malware
January 15, 2013 4:29 PM
A rogue malware program is targeting government data stored on European and U.S. networks.
(Source: Rex Features)
Cyberespionage code has been stealing secrets for at least five years
Russia's Kaspersky Lab, a top international security firm, has uncovered a stunningly sophisticated piece of malware that's been infiltrating defense machines with North Atlantic Treaty Organization (NATO) and other Western military groups over the last half decade.
I. Red October Runs Wild, Evades Deletion
, "During the past five years, a high-level cyber-espionage campaign has successfully infiltrated computer networks at diplomatic, governmental and scientific research organizations, gathering data and intelligence from mobile devices, computer systems and network equipment."
Much attention has been devoted of late to cyber-espionage efforts allegedly perpetrated by the U.S. and Israel. The
campaigns against Iran
captivated readers and infuriated supporters of the Islamist republic of Iran.
But with this new malware, which researchers have dubbed "Red October", the tables are turned U.S. and its allies are the targets.
To give one example of the sophistication of the multi-module attack package, if the user detects Red October and deletes it, a secondary hidden package can detect the deletion and carry out a protocol to reinstall the malware. The so-called "Resurrection Module" masquerades as plug-ins to Adobe Systems Inc.'s (
) PDF Reader or Microsoft Corp.'s (
) Office suite and is inactive until the malware is deleted.
Red October can resurrect itself via a malicious Office plug-in.
The malware has pieces that spread onto USB drives, allowing remote command servers to access deleted files. The malware can spread to a variety of mobile devices including Apple, Inc.'s (
) iPhone, Nokia Oyj.'s (
) Symbian OS, and Microsoft's Windows Phone/Windows Mobile (Android was not mentioned). The malware can even infect routers and switches, stealing their configuration information.
The packages aboard the core malware are designed to defeat a broad range of cryptography, including specialized government protocols such as the
, a series of packages commonly used by European Union governments.
II. Who's Piloting Red October?
The malware features a grab bag of features, mostly from Eastern European, Russian, and Chinese sources.
, designed to infect high-profile targets, copy the attack methodology and code of campaigns that China allegedly used
against Tibetan activists
. Other attack modules borrow heavily from malware allegedly traced to freelance hackers in the employ of the Chinese government. And the vulnerability discovery code, which identifies how best to attack the local machine closely matches that
, a piece of malware believed to have been developed by hackers in Ukraine.
But there's also a strong Russian influence in malware (hence the name Kaspersky gave it). The researchers comment:
Based on the registration data of C2 servers and the numerous artifacts left in executables of the malware, there is strong technical evidence to indicate the attackers have Russian-speaking origins.
In other words, there's Russian words nestled in the code. When the malware gains access to the system, it orders words to the command prompt be rendered in Cyrillic fonts. Cyrillic is the alphabet used by the Russian language and various other related languages from the Balkans and Northern Eurasia.
But are those true clues or just red herrings? It's hard to say. It's widely held that China and Iran -- who happen to be close trade partners and allies -- are the two most aggressive and sophisticated cyber-aggressors when it comes to attacking the U.S. and its allies. But often China is believed to rely on third parties -- e.g. hackers in Eastern Europe or Russia -- to do its "dirty work".
Red October is the first known malware to salvage deleted files on USB sticks.
[Image Source: Akihabara]
H.D. Moore, chief security officer of security firm Rapid7 and creator of the popular security testing software Metasploit, said in
that he was "surprised it got as far as it did" given it's proclivity for stealing not just a handful of files, but all sorts of settings and documents from the target machine.
He adds that the recovery software to steal deleted files from USB disks also is a new twist and shows substantial creativity/sophistication. He comments, "We hadn't seen that before in malware. The threat is that USB drives are often shared between people, especially at conferences. Even if you take precautions to delete files and you trust the person you are sharing this with, this malware would be able to automatically recover deleted files and siphon them off without either party being aware."
He argues that Flame is more advanced, but that the sophisticated Red October can still do plenty of "scary things".
U.S. Computer Emergency Readiness Team
(US-CERT), a subagency of the
U.S. Department of Homeland Security
(DHS) tasked with cyberdefense, is currently investigating the newly discovered malware and assessing whether it gained access to any important files during its silent rampage.
"The whole principle [of censorship] is wrong. It's like demanding that grown men live on skim milk because the baby can't have steak." -- Robert Heinlein
Iran Accuses U.S. and Israel of Spreading Holiday Stuxnet "Cheer"
December 26, 2012, 3:57 PM
Quick Note: China Targets White House in Cyber Attack
October 1, 2012, 8:21 PM
United States Accused of Using Flame to try to Cripple Iran's Economy
June 22, 2012, 1:31 PM
NYT: President Obama Authorized Stuxnet Attack on Iran
June 1, 2012, 1:54 PM
China Cyberspies Strike Indian Military,Tibetan Exiles, and Embassies in U.S.
April 7, 2010, 9:11 AM
Google plans ultra-fast wireless Internet for Research Triangle Park, N.C.
August 12, 2016, 6:30 AM
Twitter Senior VP: "Diversity is Important, But We Can’t Lower the Bar"
November 9, 2015, 9:59 AM
CNN Resorts to Internet Censorship to Promote Clinton Over Senator Sanders
October 15, 2015, 2:47 PM
Breaking Bad: How to Crash Google's Chrome Browser With Just 8 Characters
September 23, 2015, 11:08 AM
Quick Note: Amazon UK Offers £10 Back on Any Order £50 or Over
August 3, 2015, 12:05 PM
Editorial: Reddit Allows Itself to be Hijacked as a Hate Platform For Racist Bigots
July 21, 2015, 6:32 PM
Most Popular Articles
Problems with Windows 10 – Update Now
October 15, 2016, 7:30 AM
Is Razer Blade Stealth Laptop For You?
October 16, 2016, 5:00 AM
Bluetooth Saves Lives
October 16, 2016, 7:05 AM
Innovative Neurotechnology in Sound Therapy Reduces High Blood Pressure and Migraines
October 16, 2016, 5:00 AM
Car Insurance - The Hidden Discriminatory Practise
October 18, 2016, 5:00 AM
Latest Blog Posts
Tips to Prevent Smartphones From Overheating:
Oct 22, 2016, 5:00 AM
Nasa Flies Drones at Nevada Airport
Oct 21, 2016, 8:21 AM
T-Mobile Data Problems
Oct 20, 2016, 10:17 AM
Annoying Apple Watch Problems and How to Fix Them
Oct 20, 2016, 5:00 AM
Your Mail May Soon Be Delivered By Robot
Oct 19, 2016, 9:34 AM
2018 Jeep Wrangler Prototype Sells At Junkyard
Oct 18, 2016, 5:00 AM
Samsung Shines with Gold Edition Tablet
Oct 17, 2016, 9:24 AM
Tesla Hints Mysterious Product Debut for October 17th
Oct 16, 2016, 10:14 AM
Samsung Galaxy Note 7 Phones on US flights
Oct 15, 2016, 5:00 AM
Comcast Fined $2.3 Million For Unconfirmed Services Charged To Customers
Oct 14, 2016, 5:00 AM
“American singer / songwriter “Bob Dylan is awarded 2016 Nobel Prize in Literature.
Oct 13, 2016, 10:33 AM
Battery Defect in Medical Device
Oct 12, 2016, 5:00 AM
IBM Bolsters Social Services Sector With Technology Grants
Oct 11, 2016, 5:00 AM
Scientists Sound Alarm on Climate but US Still Toys With Skepticism
Oct 10, 2016, 5:00 AM
IMEX America Trade Show
Oct 9, 2016, 10:00 AM
Phone Wars – Google VS Samsung Free Gifts on Purchase
Oct 6, 2016, 5:00 AM
Member of Parliament’s opposition car exploded in Tbilist capital of Georgia
Oct 5, 2016, 2:52 PM
US Government Cuts Cord On Internet Oversight
Oct 3, 2016, 10:34 AM
More Blog Posts
Copyright 2016 DailyTech LLC. -
Terms, Conditions & Privacy Information