Red October (malware) - Wikipedia
Maybe your like
Contents
move to sidebar hide- (Top)
- Article
- Talk
- Read
- Edit
- View history
- Read
- Edit
- View history
- What links here
- Related changes
- Upload file
- Permanent link
- Page information
- Cite this page
- Get shortened URL
- Download QR code
- Download as PDF
- Printable version
- Wikidata item
Operation Red October or Red October was a cyberespionage malware program discovered in October 2012 and uncovered in January 2013 by Russian firm Kaspersky Lab. The malware was reportedly operating worldwide for up to five years prior to discovery, transmitting information ranging from diplomatic secrets to personal information, including from mobile devices. The primary vectors used to install the malware were emails containing attached documents that exploited vulnerabilities in Microsoft Word and Excel.[1][2] Later, a webpage was found that exploited a known vulnerability in the Java browser plugin.[1][3] Red October was termed an advanced cyberespionage campaign intended to target diplomatic, governmental and scientific research organizations worldwide.
A map of the extent of the operation was released by the Kaspersky Lab – the "Moscow-based antivirus firm that uncovered the campaign."[4]
After being revealed, domain registrars and hosting companies shut down as many as 60 domains, used by the virus creators to receive information. The attackers, themselves, shut down their end of the operation, as well.[citation needed]
The perpetrator of the operation has not been conclusively determined but it appeared to have been in operation on some level since May 2007 at the latest. According to Kaspersky Lab, Russian slang words were found in the code which would be "generally unknown to non-native Russian speakers." However, the program also appeared to be built on existing exploits developed by Chinese hackers and previously used against Tibetan activists.[4]
| Country | Government | Embassy (Diplomatic) | Military | Nuclear / Energy Research | Aerospace | Oil & Gas Industry | Trade and Commerce | Research Institutions | Unknown Victims |
|---|---|---|---|---|---|---|---|---|---|
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | Yes | Yes | No | No | No | Yes | No | |
| Yes | Yes | Yes | Yes | No | Yes | No | Yes | No | |
| Yes | Yes | Yes | Yes | Yes | No | No | No | No | |
| Yes | Yes | No | Yes | No | Yes | No | No | No | |
| No | Yes | No | Yes | No | Yes | No | Yes | No | |
| Yes | No | No | Yes | No | Yes | No | No | No | |
| Yes | Yes | Yes | No | No | No | No | No | No | |
| Yes | Yes | Yes | No | No | No | No | No | No | |
| No | Yes | Yes | No | No | No | No | No | No | |
| Yes | Yes | No | No | No | No | No | No | No | |
| Yes | Yes | No | No | No | No | No | No | No | |
| Yes | Yes | No | No | No | No | No | No | No | |
| Yes | No | No | No | No | No | No | No | No | |
| Yes | No | No | No | No | No | No | No | No | |
| Yes | No | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | Yes | No | No | No | No | No | No | No | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| No | No | No | No | No | No | No | No | Yes |
References
[edit]- ^ a b McAllister, Neil (16 Jan 2013). "Surprised? Old Java exploit helped spread Red October spyware". The Register.
- ^ "The "Red October" Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies". Kaspersky Lab. 3 Mar 2014. Archived from the original on 2013-01-15.
- ^ Goodin, Dan (15 Jan 2013). "Red October relied on Java exploit to infect PCs". Ars Technica.
- ^ a b c Zetter, Kim (January 14, 2013). "Cybersleuths Uncover 5-Year Spy Operation Targeting Governments, Others". Wired. Retrieved 25 January 2023.
External links
[edit]- Info at kaspersky.com
| |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ← 2000s Timeline 2020s → | |||||||||||||||||||||
| Major incidents |
| ||||||||||||||||||||
| Hacktivism |
| ||||||||||||||||||||
| Groups |
| ||||||||||||||||||||
| Individuals |
| ||||||||||||||||||||
| Major vulnerabilitiespublicly disclosed |
| ||||||||||||||||||||
| Malware |
| ||||||||||||||||||||
- Spyware
- Hacking in the 2010s
- Espionage in Russia
- Cybercrime in India
- Articles with short description
- Short description matches Wikidata
- All articles with unsourced statements
- Articles with unsourced statements from August 2016
Tag » What Is Red October 2021
-
The Real Hunt For Red October (TV Special 2021) - IMDb
-
Red October (disambiguation) - Wikipedia
-
Surviving "Red October": A Quick Guide - Assured Support
-
The Hunt For Red October (or November) - PMC - NCBI
-
Hunt For Red October - The Diplomat
-
The Next “Red October” Yeezy Is Almost Here - GQ
-
THE BARON IS BACK AND RED OCTOBER HAS BEGUN!!
-
Red October Run | Beaumont Health
-
Changes To 'red List' Requirements From 4 October 2021
-
The Hunt For Red October [Blu-ray] [2021] - Amazon UK
-
How To Watch And Stream The Real Hunt For Red October - Roku
-
The Hunt For Red October - Rotten Tomatoes
-
Seeing Red Film Series: The Hunt For Red October | Wende Museum
-
ASIC Won't Hunt Compliance Breaches In Red October