Red October Cyber Spy Op Goes Mobile via Spear-Phishing

Red October Cyber Spy Op Goes Mobile via Spear-Phishing

Malware ready for Android, iOS and BlackBerry, over 60 mobile operators included in the preparations

Red October Cyber Espionage Campaing Resurrected with “Cloud Atlas” Malware

Red October Cyber Espionage Campaing Resurrected with “Cloud Atlas” Malware

Threat actor targets the same victim profile, most victims have been detected in Russia and Kazakhstan

China and Russia Suspected of Conducting Cyber Espionage Operation Against Finland

China and Russia Suspected of Conducting Cyber Espionage Operation Against Finland

The malware used in the attack is similar to the notorious Red October

ENISA Urges European Businesses and Governments to Take Action Against Cyberattacks

ENISA Urges European Businesses and Governments to Take Action Against Cyberattacks

The agency highlights some common attack vectors used by cybercriminals

Red October Scares Russia, Putin Orders New Cyber Security Structure

Red October Scares Russia, Putin Orders New Cyber Security Structure

The new unit will be part of the country's Federal Security Service

AlienVault and Kaspersky Help Organizations Neutralize Red October Attack

AlienVault and Kaspersky Help Organizations Neutralize Red October Attack

The companies have released a whitepaper that details the cyber espionage campaign

Red October Could Be the Work of Sophisticated Hackers Catering to Secret Services

Red October Could Be the Work of Sophisticated Hackers Catering to Secret Services

Mikko Hypponen and Eugene Kaspersky share some insight on Red October at DLD

Security Brief: Red October, Aaron Swartz, Java

Security Brief: Red October, Aaron Swartz, Java

The main events of the week between January 14 and January 20

Cybercriminals Behind Red October Start Shutting Down C&C Infrastructure

Cybercriminals Behind Red October Start Shutting Down C&C Infrastructure

Hosts and registrars have started terminating the operation

Red October Removal Tool Released by Bitdefender

Red October Removal Tool Released by Bitdefender

It does not require installation, targets Red October malware

Kaspersky Set Up Fake Victims Around the World to Analyze “Red October” Attacks

Kaspersky Set Up Fake Victims Around the World to Analyze “Red October” Attacks

The security firm has released the second part of its report on the espionage campaign

Red October Cyber Espionage Campaign Relied on Java Exploit to Infect Computers

Red October Cyber Espionage Campaign Relied on Java Exploit to Infect Computers

Seculert experts have also analyzed the C&C servers of the 5-year-long operation

Red October: Espionage Campaign Targeting Government, Other High-Profile Organizations

Red October: Espionage Campaign Targeting Government, Other High-Profile Organizations

The operation dates as far back as 2007 and it has made hundreds of victims