Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Kaspersky Lab Dives Deeper Into Red October Cyber-espionage Campaign

The phrase ‘Hunt for Red October‘ no longer refers only to the work of author Tom Clancy, or the film based on his novel.

The phrase ‘Hunt for Red October‘ no longer refers only to the work of author Tom Clancy, or the film based on his novel.

Today, it also refers to a sophisticated cyber-espionage operation that stretches back to 2007. On the perpetrators’ tails have been a team of researchers from Kaspersky Lab and Computer Emergency Response Teams (CERTs) around the world. Now, in a detailed analysis, Kaspersky Lab has posted more information about the inner workings of an attack its researchers say rivals Flame in complexity.

Red October Attacks Malware“According to our knowledge, never before in the history of ITSec has [a] cyber-espionage operation been analyzed in such deep detail, with a focus on the modules used for attack and data exfiltration,” Kaspersky Lab blogged. “In most cases, the analysis is compromised by the lack of access to the victim’s data; the researchers see only some of the modules and do not understand the full purpose of the attack or what was stolen.”

“To get around these hiccups, we set up several fake victims around the world and monitored how the attackers handled them over the course of several months. This allowed us to collect hundreds of attack modules and tools. In addition to these, we identified many other modules used in other attacks, which allowed us to gain a unique insight into the attack.”

At the center of the attack is the malware, detected by Kaspersky Lab as Backdoor.Win32.Sputnik. With Sputnik, the attackers infected hundreds of systems around the world, primarily on government networks in Eastern Europe. According to Kaspersky, the main component of Sputnik implements a framework for executing tasks, some of which are executed in memory and then immediately discarded. Others, such as waiting for an iPhone or Nokia phone to be connected, are persistent.

Among the modules unmasked in the analysis is a module embedded as a plugin inside Adobe Reader and Microsoft Office that allows the attackers to “resurrect” infected machines if the main malware body is discovered and removed or the system is patched. This feature can be triggered when the attackers send a malicious document file to the victim’s machine via email to reactivate the malware.

Other modules are meant to steal information, including files from different cryptographic systems such as Acid Cryptofiler, which is known to be used in organizations of NATO, the European Union and other government entities.

To get the malware onto targeted computers, the attackers used a mix of Microsoft Word and Excel exploits and targeted a known Java vulnerability as well.

“The research that we are publishing today is perhaps the biggest malware research paper ever,” according to Kaspersky Lab. “It is certainly the most complex malware research effort in the history of our company and we hope that it sets new standards for what anti-virus and anti-malware research means today.”

Advertisement. Scroll to continue reading.

The company’s complete analysis can be read online here. 

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...