All the latest UK technology news, reviews and analysis

European Commission rules out Red October malware attack

16 Jan 2013
European commission

The European Commission (EC) has said there is no evidence to suggest the Red October cyber espionage campaign managed to infiltrate its networks.

The five-year campaign was uncovered earlier in the week, targeting numerous government organisations.

However, an EC spokesperson told V3 it has yet to detect any evidence of the Red October campaign's malware in its systems.

"So far there is no concrete evidence that the Commission has been targeted by this malware. But the security team are aware of the threat and are of course working on a permanent basis to control this and any other kind of attacks," the spokesperson told V3.

The news is surprising as Belgium was the third most infected country targeted by Red October, according to security firm Kaspersky Labs, which reported detecting 16 infections in the country.

Only two other countries boasted more infections, with Kaspersky detecting 38 incidents in Russia and 21 incidents in Kazakhstan.

The high number of Belgium infections was initially believed to be due to the country's close ties with the European Parliament and Commission.

Red October is a sophisticated cyber espionage campaign believed to have stemmed from a Russian-speaking group. It is thought to have been active for at least five years.

Red October is the latest cyber espionage tool to be uncovered targeting political institutions. Prior to Red October, Kaspersky also uncovered the infamous Flame malware.

Despite sharing a common purpose to Flame and being similarly complex, Kaspersky has been quick to note the two campaigns are not linked.

"So far, we haven't come by any credible information that can suggest a link between the authors of Red October and Flame. The two campaigns are significantly different and at the moment we do not have any technical evidence that connects them," Kaspersky director, Costin Raiu told V3.

"In terms of complexity and sophistication of this attack, Red October is on par with Flame. At the same time, there is no clear evidence that links Red October with a nation-state sponsored operation. In terms of methods used to attack victims Flame and Red October are very different."

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?

Popular Threads

Powered by Disqus
Sony Xperia Z2 Tablet powered by Android KitKat 4.4

Sony Xperia Z2 Tablet video

We take a look at the lightweight, waterproof tablet

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery


iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Senior IS Compliance Analyst (Risk Assessments) - Growing area

Senior IS Compliance Analyst / Risk Analyst (Risk Assessments...

Web Designer / UI Front End Developer - Opp in new department!

Web Designer / UI Front End Developer (HTML(5), CSS...

Senior Product Manager x2 (Online & Web Platform) - Global Org

Senior Product Manager x2 (Online, Software & Web...

Senior Web Developer / OO Software Engineer (Learn Ruby!)

Senior Web Developer / Software Engineer (Opportunity...
To send to more than one email address, simply separate each address with a comma.