- Security
- By Ionut Ilascu
- December 10th, 2014
Red October Cyber Spy Op Goes Mobile via Spear-Phishing
Malware ready for Android, iOS and BlackBerry, over 60 mobile operators included in the preparations
- Virus alerts
- By Ionut Ilascu
- December 10th, 2014
Red October Cyber Espionage Campaing Resurrected with “Cloud Atlas” Malware
Threat actor targets the same victim profile, most victims have been detected in Russia and Kazakhstan
- Security Blog
- By Eduard Kovacs
- November 1st, 2013
China and Russia Suspected of Conducting Cyber Espionage Operation Against Finland
The malware used in the attack is similar to the notorious Red October
- Security Blog
- By Eduard Kovacs
- March 13th, 2013
ENISA Urges European Businesses and Governments to Take Action Against Cyberattacks
The agency highlights some common attack vectors used by cybercriminals
- Security Blog
- By Eduard Kovacs
- January 28th, 2013
Red October Scares Russia, Putin Orders New Cyber Security Structure
The new unit will be part of the country's Federal Security Service
- Security Blog
- By Eduard Kovacs
- January 21st, 2013
AlienVault and Kaspersky Help Organizations Neutralize Red October Attack
The companies have released a whitepaper that details the cyber espionage campaign
- Security Blog
- By Eduard Kovacs
- January 21st, 2013
Red October Could Be the Work of Sophisticated Hackers Catering to Secret Services
Mikko Hypponen and Eugene Kaspersky share some insight on Red October at DLD
- Weekly Roundup
- By Eduard Kovacs
- January 20th, 2013
Security Brief: Red October, Aaron Swartz, Java
The main events of the week between January 14 and January 20
- Security Blog
- By Eduard Kovacs
- January 19th, 2013
Cybercriminals Behind Red October Start Shutting Down C&C Infrastructure
Hosts and registrars have started terminating the operation
- Security Blog
- By Ionut Ilascu
- January 18th, 2013
Red October Removal Tool Released by Bitdefender
It does not require installation, targets Red October malware
- Virus alerts
- By Eduard Kovacs
- January 18th, 2013
Kaspersky Set Up Fake Victims Around the World to Analyze “Red October” Attacks
The security firm has released the second part of its report on the espionage campaign
- Security Blog
- By Eduard Kovacs
- January 15th, 2013
Red October Cyber Espionage Campaign Relied on Java Exploit to Infect Computers
Seculert experts have also analyzed the C&C servers of the 5-year-long operation
- Virus alerts
- By Eduard Kovacs
- January 14th, 2013
Red October: Espionage Campaign Targeting Government, Other High-Profile Organizations
The operation dates as far back as 2007 and it has made hundreds of victims