All the latest UK technology news, reviews and analysis


European Commission rules out Red October malware attack

16 Jan 2013
European commission

The European Commission (EC) has said there is no evidence to suggest the Red October cyber espionage campaign managed to infiltrate its networks.

The five-year campaign was uncovered earlier in the week, targeting numerous government organisations.

However, an EC spokesperson told V3 it has yet to detect any evidence of the Red October campaign's malware in its systems.

"So far there is no concrete evidence that the Commission has been targeted by this malware. But the security team are aware of the threat and are of course working on a permanent basis to control this and any other kind of attacks," the spokesperson told V3.

The news is surprising as Belgium was the third most infected country targeted by Red October, according to security firm Kaspersky Labs, which reported detecting 16 infections in the country.

Only two other countries boasted more infections, with Kaspersky detecting 38 incidents in Russia and 21 incidents in Kazakhstan.

The high number of Belgium infections was initially believed to be due to the country's close ties with the European Parliament and Commission.

Red October is a sophisticated cyber espionage campaign believed to have stemmed from a Russian-speaking group. It is thought to have been active for at least five years.

Red October is the latest cyber espionage tool to be uncovered targeting political institutions. Prior to Red October, Kaspersky also uncovered the infamous Flame malware.

Despite sharing a common purpose to Flame and being similarly complex, Kaspersky has been quick to note the two campaigns are not linked.

"So far, we haven't come by any credible information that can suggest a link between the authors of Red October and Flame. The two campaigns are significantly different and at the moment we do not have any technical evidence that connects them," Kaspersky director, Costin Raiu told V3.

"In terms of complexity and sophistication of this attack, Red October is on par with Flame. At the same time, there is no clear evidence that links Red October with a nation-state sponsored operation. In terms of methods used to attack victims Flame and Red October are very different."

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

Tech gifts for Christmas 2014

Is a new tablet on your wish list this festive season, or have they become yesterday’s fad?
12%
23%
11%
6%
48%

Popular Threads

Powered by Disqus
iPhone 6 is available in silver gold and space grey

iPhone 6 video review

The best iOS handset to date

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv3may

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Application Support Analyst

UCL Application Services; Common and Infrastructure Applications...

Technical Project Managers

Technical Project Managers Bitwise is looking for...

Junior Developer C# .NET

Ultima are a leading end to end IT infrastructure partner...

Senior Software Developer

Senior Software Developer Application Development...
To send to more than one email address, simply separate each address with a comma.