Visitors Now:
Total Visits:
Total Stories:
Profile image
By ActivistPost (Reporter)
Contributor profile | More stories
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

‘Red October’ Spy Network Goes Dark Hours After Being Exposed

Saturday, January 26, 2013 7:20
% of readers think this story is Fact. Add your two cents.

(Before It's News)

B4INREMOTE-aHR0cDovLzMuYnAuYmxvZ3Nwb3QuY29tLy1RZzE1eExvMXdsWS9VUVBkLU5jOWxMSS9BQUFBQUFBQUpBSS8wUDUxYUpTZzBnYy9zMTYwMC9yZWQtb2N0b2Jlci0zMDB4MTY4LmpwZw==

Chris Dougherty, Contributor
Activist Post

The command and control servers behind the ‘Red October’ espionage network started shutting down only hours after the campaign was exposed by Kapersky Lab last week.

The Red October malware campaign targeted governments, embassies and scientific organizations around the world. According to researchers at Kapersky Lab, the spy network had been gathering data and intelligence from mobile devices, computer systems and network equipment for the last five years.

The malware, and the complex network design behind it, is rumored to rival the infrastructure of the Flame virus.  The Red October malware contains 1,000 separate modules in 30 categories, allowing an attacker the ability to serve unique combinations of payloads to their targets based on the victim’s specific computer configuration and profile.

In an interview with Costin Raiu, of the Kaspersky Lab GReAT Team,  Raiu said “since Monday, when the first report of the campaign came out, hosting providers and domain owners have been shutting down servers used to help run the campaign”.

‘It’s clear that the infrastructure is being shut down. This time it’s being shut down for good,’ Raiu said. ‘It’s not only the registrars killing the domains, and the hosting providers killing the command-and-control servers, but perhaps the attackers shutting down the whole operation.’

One of Red October’s strengths is a command and control (C&C) infrastructure that employs multiple layers of computers and domain names acting as proxies to hide the core functionality of the network.  Raiu was quoted as describing the network design as “an onion with multiple skins”, communicating to a control server at the center that collects all of the stolen information.

Raiu went on to say that the majority of the servers and domains shut down so far only represent the first level of the threat, essentially the proxy layer.  He also speculated that the malware controllers may simply let the operation go dormant for a while until the heat is off. However it seems likely that the attackers would reappear in the near future using updated malware, domains and control servers.

Red October is a large and comprehensive attack framework that was designed to enable attackers to conduct long-term operations against their chosen targets. It’s likely that researchers haven’t even scratched the surface with regard to the complexities involved in this campaign.

See related article:
http://www.virtualthreat.com/2013/01/15/operation-red-october-is-spying-on-governments-worldwide/

Chris Dougherty is a grey hat hacker and online security expert.  Please visit his blog, www.VirtualThreat.com, for more excellent news and information about protecting yourself in cyberspace.

BE THE CHANGE! PLEASE SHARE THIS USING THE TOOLS BELOW



Source:

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.