According to the DailyMail.co.uk, since 2007, there has been a cyber attack throughout Eastern Europe through a malware called Red October. Red October malware has been able to hack into numerous high-level government computers throughout the world. Researchers are finding this malware is still in operation today and stealing a great deal of terabytes or data.
The organization who learned about this malware thinks the common language used is Russian, especially with the Broken English used to write these programs. It is speculated there might be more than one country involved in this Red October malware intrusion.
These cyber attacks are made to target high-ranking diplomats and other government agencies such as nuclear and energy companies and major research institutions throughout the world.
This malware is so cunning; it is able to infiltrate government employee cell phones (Smartphone) and other electronic instruments. Red October malware is unlike any other because it works as an email or when a PDF file is open in the computer or Smartphone it enters the system files. These are emails or PDFs that would not make the user leery of opening. For computer users who think they might have been infected with a virus, these users usually think shutting down, and restarting their computer, would fix this issue. This is not the case with Red October. Even when the computer is restarted, the malware code is still on the computer or Smartphone.
Remember, the sole purpose of the malware, Red October, is to take information that is not intended for the hackers use. This malware will harm everyone, which means everyone online is under attack especially, when it comes to “sharing” what might be embarrassing images to everyone on the Internet. If this was not bad enough, every email a government employee receives is customized for them. This means they would have no reason to doubt it was not written expressly for them. So, these emails or PDF files would not be expected to be “form” letters, et al.
You can follow any responses to this entry through the RSS 2.0 feed.
Leave your comment