Breaking News

KINGMAX Launches DDR5 Horizon II Overclocking Memory Module, Tailored for High-Load Scenarios DeepCool Unveils SPARTACUS 360 AIO Liquid Cooler for High-End Performance and Customization KINGMAX Launches New DDR4 Blade X Gaming RAM, Delivering Powerful Performance for Intel/AMD Platforms Corsair announces FRAME 4000D LCD RS ARGB PC Case Samsung Launches One UI 8.5 Beta for Next-Level Ease of Use

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Java Exploit Behind "Red October" Cyber Attacks

Java Exploit Behind "Red October" Cyber Attacks

Enterprise & IT Jan 15,2013 0

Security researchers from Seculert discovered that the attackers of the large-scale cyberespionage operation dubbed "Red October" were taking advantage of Web-based Java exploits as well as malicious Excel and Word documents. Kaspersky Lab's researchers published the results of their investigation into Red October on Monday. According to their report, the victims were targeted via rogue email messages that contained malicious documents designed to exploit known vulnerabilities in Microsoft Excel and Word.

However, after investigating the Command-and-Control (C2) servers used in the "Red October" campaign, Seculert researchers identified a special folder used by the attackers for an additional attack vector. In this vector, the attackers sent an email with an embedded link to a specially crafted PHP web page. This webpage exploited a vulnerability in Java (CVE-2011-3544), and in the background downloaded and executed the malware automatically, the researchers said.

The discovery was made possible because the attackers switched from using PHP as the server-side scripting language on their command and control servers to CGI. Some older PHP-based attack pages were still left on the servers and accessing them in a browser revealed their source code, the Seculert researchers added.

Further analysis is impossible at this time because the command and control servers have been shut down, most likely by the attackers in an attempt to cover their tracks, Seculert's researchers added.

The attack pages, the Java exploit itself and even the URL for the malware payload contained strings referencing "news," in an effort to trick the victims.

Tags: Virus
Previous Post
Microsoft Advances the Cloud OS With New Management Solutions
Next Post
564 Million Chinese Have Internet Access

Related Posts

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

  • Cisco Identifies Virus That Kills Off PCs

  • Researchers Identify iOS Espionage App

  • Researchers Identify New iOS Vulnerability

  • Dropbox, WordPress Used To Spread Malware

  • Microsoft Says Viruses Are Back On The Rise

  • First Targeted Attack Utilising Malware for Android Devices Reported

  • Cyber Attack Targets Nato, Government Websites

Latest News

KINGMAX Launches DDR5 Horizon II Overclocking Memory Module, Tailored for High-Load Scenarios
PC components

KINGMAX Launches DDR5 Horizon II Overclocking Memory Module, Tailored for High-Load Scenarios

DeepCool Unveils SPARTACUS 360 AIO Liquid Cooler for High-End Performance and Customization
Cooling Systems

DeepCool Unveils SPARTACUS 360 AIO Liquid Cooler for High-End Performance and Customization

KINGMAX Launches New DDR4 Blade X Gaming RAM, Delivering Powerful Performance for Intel/AMD Platforms
PC components

KINGMAX Launches New DDR4 Blade X Gaming RAM, Delivering Powerful Performance for Intel/AMD Platforms

Corsair announces FRAME 4000D LCD RS ARGB PC Case
Cooling Systems

Corsair announces FRAME 4000D LCD RS ARGB PC Case

Samsung Launches One UI 8.5 Beta for Next-Level Ease of Use
Smartphones

Samsung Launches One UI 8.5 Beta for Next-Level Ease of Use

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed