All the latest UK technology news, reviews and analysis


European Commission rules out Red October malware attack

16 Jan 2013
European commission

The European Commission (EC) has said there is no evidence to suggest the Red October cyber espionage campaign managed to infiltrate its networks.

The five-year campaign was uncovered earlier in the week, targeting numerous government organisations.

However, an EC spokesperson told V3 it has yet to detect any evidence of the Red October campaign's malware in its systems.

"So far there is no concrete evidence that the Commission has been targeted by this malware. But the security team are aware of the threat and are of course working on a permanent basis to control this and any other kind of attacks," the spokesperson told V3.

The news is surprising as Belgium was the third most infected country targeted by Red October, according to security firm Kaspersky Labs, which reported detecting 16 infections in the country.

Only two other countries boasted more infections, with Kaspersky detecting 38 incidents in Russia and 21 incidents in Kazakhstan.

The high number of Belgium infections was initially believed to be due to the country's close ties with the European Parliament and Commission.

Red October is a sophisticated cyber espionage campaign believed to have stemmed from a Russian-speaking group. It is thought to have been active for at least five years.

Red October is the latest cyber espionage tool to be uncovered targeting political institutions. Prior to Red October, Kaspersky also uncovered the infamous Flame malware.

Despite sharing a common purpose to Flame and being similarly complex, Kaspersky has been quick to note the two campaigns are not linked.

"So far, we haven't come by any credible information that can suggest a link between the authors of Red October and Flame. The two campaigns are significantly different and at the moment we do not have any technical evidence that connects them," Kaspersky director, Costin Raiu told V3.

"In terms of complexity and sophistication of this attack, Red October is on par with Flame. At the same time, there is no clear evidence that links Red October with a nation-state sponsored operation. In terms of methods used to attack victims Flame and Red October are very different."

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

Windows 7 end of mainstream support

What are your plans for when Microsoft ends mainstream support for Windows 7 in January 2015?
9%
9%
3%
66%
13%

Popular Threads

Powered by Disqus
LG G3 in gold black and white

LG G3 vs Galaxy S5 video

We pit the two Korean firms' flagship smartphones against each other

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv3may

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Sharepoint Administrator (SQL)

SharePoint Administrator My client is looking for...

Network Support Engineer

Search Consultancy are currently recruiting a Network...

Cognos BI Developer

Financial Services client requires a Cognos BI developer...

Project Online / Project Server Consultant

MS Project Online / Project Server 2013 (Cloud) Consultant...
To send to more than one email address, simply separate each address with a comma.