All the latest UK technology news, reviews and analysis


AlienVault and Kaspersky issue firms with Red October security threat report

21 Jan 2013
Security padlock image

Security firms AlienVault and Kaspersky have moved to arm businesses against the Red October cyber espionage campaign by releasing guidance on how to detect the malware.

The two firms released a white paper breaking down the key signs companies should look out for when trying to detect a Red October infection on Monday.

"In this whitepaper we are describing indicators of compromise that basically are every piece of technical information that can help a system/network administrator to detect present and previous intrusions related with the Red October campaigns," head of Labs at AlienVault, Jaime Blasco told V3.

The information contained in the paper included basic information like the IP addresses and domain names of the command and control servers used by the Red October attackers.

Blasco said that the information will prove invaluable to companies looking to improve their cyber defences against the Red October threat.

"This information can be use to look in your logs from the past few years in order to detect if the intruders has been in your network during this period," Blasco told V3.

"You can also put this information in your firewalls, proxies and so forth in order to detect machines that are trying to connect to those IP addresses that can indicate an actual compromise.

"Domain names of the command and control server can be used also like the IP addresses to detect suspicious hosts that are trying to resolve the domain names used by the attackers."

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
21%
13%
4%
22%
29%
11%

Popular Threads

Powered by Disqus
Sony Xperia Z2 Tablet powered by Android KitKat 4.4

Sony Xperia Z2 Tablet video

We take a look at the lightweight, waterproof tablet

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Senior IT Systems Analyst - Edinburgh

Senior IT Systems Analyst- Edinburgh - Competitive Salary...

Software Development Engineer

Develop: Customise: Configure. Maximise your technical...

2nd Line Support Engineer

2nd Line Support Engineer FFGroup are looking for a...

Developers - Freelance and Permanent

Seven Publishing are rapidly expanding our network of...
To send to more than one email address, simply separate each address with a comma.