Giant Spy Operation Attacked Governments For Five Years Before Being Discovered
Researchers in Russia have uncovered an on-going spy operation so extensive that it has victimized 69 different countries in the last five years.
Moscow-based Kaspersky Labs has dubbed the operation "Red October," and first discovered the espionage campaign back in October 2012. Though the lab didn't say what kind of information the hackers stole, it did note that the vicitims were "high profile," ranging from government agencies and embassies, to researchers in the fields of nuclear energy and aerospace.
Most of the infections have been detected in Russia, although many countries were attacked multiple times, including the United States, India, Iran, Belgium, and the United Arab Emirates.
"The main purpose of the operation appears to be the gathering of classified information and geopolitical intelligence, although it seems that the information gathering scope is quite wide," said Kaspersky in a report on Monday. "During the past five years, the attackers collected information from hundreds of high profile victims although it's unknown how the information was used."
There's no evidence suggesting that the attacks are associated with any nation, though that doesn't necessarily signal anything significant. It's possible the information stolen by the hackers could be sold on the black market to the highest bidder, meaning any nation, rogue organization, or individual interested.
Still, some clues hint to the idea that the attackers speak Russian. Kaspersky found Russian words in the code that suggest the spies are native speakers, and the servers used to connect to and steal information from infected devices were registered to Russian email addresses. In addition, some of the command structure servers are based in Russia, although there are some in Germany as well.
Kaspersky's Costin Raiu warns that all these signs may simply be red herrings intended to lead investigators in the wrong direction.
Even if the hackers are Russian-speaking, they have gotten by using a mix of internally-developed technology and the same Chinese-developed programming exploits used against Tibetan activists and other victims in Asia.
"We can assume that these exploits have been originally developed by Chinese hackers, or at least on Chinese code page computers," said Raiu. "They're using outer shells that have been used against Tibetan activists, but the malware itself does not appear to be of Chinese origin."
Kaspersky Labs continues to investigate Red October with a number of different international and government organizations.
A New Mac Malware Could Nastily Take Over Your Computer
The nasty malware is being spread through a targeted phishing campaign which has so far primarily targeted European users. Many of the emails containing the malicious software have baited users into downloading OSX/Dok.
Your Android Phone May Be Infected With Malware
A study identified severe malware infection in 38 Android devices that are said to have been pre-installed.
More Than Half Of The World's Internet Traffic Comes From Bots, Not Humans
According to a published report called Imperva Incapsula Bot Traffic Report, the world's internet traffic is not mainly caused by humans, but from bots.
Malware To Be Found On Less Suspicious File Types
Security experts warn that malware distributors are using now less suspicious file types.
How Secure Are The Connected Cars?
The connected cars might be vulnerable to hacking and cyber attacks.
MORE IN ITECHPOST
Fitness Expert, Jolene Cherry, Explains How to Build Good Fitness Habits Using Tech
Cherry explores several different technology gizmos and gadgets to keep in mind when the initial burst of fitness motivation runs dry.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Eight Must-Have Tools to Keep Your Car Out of Garage
We all dread taking our car to a garage for repairs. We might just want to avoid the inconvenience of being off the road or maybe the costs associated, which can even lead to knock-on effects on things like our holiday plans.
6 Hacks for Students to Choose a Laptop While on a Budget
The modern world tries to drown us in the sea of choices. One can’t simply buy a laptop - there are hundreds of laptops around and sometimes our budget becomes the only real limitation we can rely on. But how to choose other parameters to get the best laptop possible?