Home
In this issue
Feb. 8, 2013

Rabbi Berel Wein: Lofty ideals must be followed with grounded applications

Clifford D. May: Letter from the West Bank
Steve Rothaus: Judge OKs plan for gay man, lesbian couple to be on girl's birth certificate
Gloria Goodale: States consider drone bans: Overreaction or crucial for privacy rights?
Environmental Nutrition Editors: Don't buy the aloe vera juice hype
Michael Craig Miller, M.D.: Harvard Experts: Regular exercise pumps up memory, too
Erik Lacitis: Vanity plates: Some take too much license
The Kosher Gourmet by Susie Middleton: Broccoflower, Carrot and Leek Ragout with Thyme, Orange and Tapenade is a delightful and satisfying melange of veggies, herbs and aromatics
Feb. 6, 2013

Nara Schoenberg: The other in-law problem

Frank J. Gaffney Jr. : A see-no-jihadist for the CIA
Kristen Chick: Ahmadinejad visits Cairo: How sect tempers Islamist ties between Egypt, Iran
Roger Simon: Ed Koch's lucky corner
Heron Marquez Estrada: Robot-building sports on a roll
Patrick G. Dean, M.D.: Mayo Clinic Medical Edge: How to restore body's ability to secrete insulin
Sharon Palmer, R.D.: 3 prostate-protecting diet tips
The Kosher Gourmet by Emma Christensen 7 principles for to help you make the best soup ever in a slow cooker
Feb. 4, 2013

Jonathan Tobin: Can Jewish Groups Speak Out on Hagel?

David Wren: Findings of government study, released 3 days before Newtown shooting, at odds with gun-control crusaders
Kristen Chick: Tahrir becomes terrifying, tainted
Curtis Tate and Greg Gordon: US keeps building new highways while letting old ones crumble
David G. Savage: Supreme Court to hear case on arrests, DNA
Harvard Health Letters: Neck and shoulder pain? Know what it means and what to do
Andrea N. Giancoli, M.P.H., R.D.: Eat your way to preventing age-related muscle loss
The Kosher Gourmet by Diane Rossen Worthington Baked Pears in Red Wine and Port Wine Glaze: A festive winter dessert
Feb. 1, 2013

Rabbi Dr. Tzvi Hersh Weinreb: Redemption

Clifford D. May Home, bloody, home
Christa Case Bryant andNicholas Blanford Why despite Syria's allies warning of retaliation for Israeli airstrikes, the threats are likely hollow
Rick Armon, Ed Meyer and Phil Trexler Ex-police captain cleared by DNA test is freed after nearly 15 years
Harvard Health Letters: Could it by your thyroid?
Sharon Palmer, R.D.: When 'healthy food' isn't
Sue Zeidler: Coke ad racist? Arab-American groups want to yank Super Bowl ad (INCLUDES VIDEO)
The Kosher Gourmet by Nealey Dozier The secret of this soup is the garnish
January 30, 2013

Allan Chernoff: Celebrating 'Back from the Dead Day'

America isn't a religious country? Don't tell Superbowl fans!
Mark Clayton Cybercrime takedown!
Germany remembers Hitler rise to power
Israel salutes U. N. --- with the one finger salute
Sharon Palmer, R.D.: Get cookin' with heart-healthy fats
Ballot riles Guinness World Records
The Kosher Gourmet by Elizabeth Passarella Potato, Squash and Goat Cheese Gratin
January 28, 2013

Nancy Youssef: And Democracy for all? Two years on, Egypt remains in state of chaos

Fred Weir: Putin: West is fomenting jihadi 'blowback'
Meredith Cohn: Implantable pain disk may help those with cancer
Michael Craig Miller, M.D. : Ask the Harvard Experts: Are there drugs to help control binge eating?
David Ovalle Use of controversial 'brain mapping' technology stymied
Jane Stancill: Professor's logic class has 180,000 friends
David Clark Scott Lego Racism?
The Kosher Gourmet by Mario Batali The celebrated chef introduces us to PANZEROTTI PUGLIESI, cheese-stuffed pastry from Italy's south


Jewish World Review

'Red October' malware found snooping on Russian state networks

By Fred Weir


Printer Friendly Version




Tom Clancy fantasy come to life

Newly discovered virus -- probably vacuuming top secret data from diplomatic, scientific, and corporate computers around the world -- has infected servers worldwide, but former Soviet states are being worst hit. Why?


JewishWorldReview.com |

mOSCOW — (TCSM) When computer security experts recently discovered the hugely sophisticated and obviously state-sponsored cyber-spy worms Stuxnet and Flame, many wondered out loud whether organized criminals might soon get their hands on similar malware tools that can siphon almost any sensitive information from even the best-guarded system.

The answer may have been staring at them from their computer screens all along.

On Monday, the Russian Internet security firm Kaspersky Labs announced that it has hunted down a previously unknown, advanced cyber-espionage network that it calls "Red October," (after Tom Clancy's novel) which has probably been vacuuming top secret data from diplomatic, scientific, and corporate computers around the world since 2007.

According to the firm, the network is still active.

"Red October operations started five or more years ago, and during that time attackers went unnoticed," says Igor Soumenkov, a malware expert with Kaspersky Labs. "That is why discovery of other attacks of the same class is possible, and we do expect it."

But unlike Stuxnet and Flame, which were almost certainly cyber weapons deployed by the US and its allies against adversaries like Iran, victims of the new "Red October" malware, or Rocra for short, span the globe.



RECEIVE LIBERTY LOVING COLUMNISTS IN YOUR INBOX … FOR FREE!

Every weekday JewishWorldReview.com publishes what many in the media and Washington consider "must-reading". HUNDREDS of columnists and cartoonists regularly appear. Sign up for the daily update. It's free. Just click here.

Kaspersky says in its report that it began investigating the network after a tip-off from an anonymous partner, and has so far identified hundreds of infections worldwide, all of them in top locations such as government networks, diplomatic institutions, nuclear and aerospace agencies, and international trade groups.

The largest number of attacks — almost 100 — have struck computers in Russia and the former Soviet Union. But, Kaspersky says, "there are also reports coming from North America and Western European countries such as Switzerland or Luxembourg."

The attackers designed custom software to attack particular computer systems, experts say, using "unique modular architecture" comprised of malicious extensions, data-grabbing modules, and backdoor trojans. Information extracted was often re-used to gain entrance to other systems, by making it easier for the hackers to guess passwords and bypass security barriers.

'MOTHERSHIP' CLOAKED
The network of infected computers was controlled by a vast infrastructure created by the attackers, including more than 60 domain names and server hosting locations in several countries, mainly Russia and Germany. Kaspersky says the network was cleverly camouflaged to hide the location of the "mothership" control server.

The level of "Red October's" sophistication is comparable to the best state-sponsored efforts, such as Stuxnet and Flame, but could conceivably be the work of rogue operatives from the criminal world, says Mr. Soumenkov.

"This is the first attack that can be compared, judging by its complexity, with state-sponsored attacks like Flame," he says.

"But at the same time it can hardly be referred to as state-sponsored. It is unknown whether the collected data was used by attackers themselves, or was sold to other interested parties.... We are talking about the most sensitive types of data like confidential documents, e-mail exchanges, contact information. Scientific information was targeted as well, judging by the profiles of some victims," he adds.

While declining to name any culprits as yet, Kaspersky says based on several factors, including "numerous artifacts left in executables of the malware, we strongly believe that the attackers have Russian-speaking origins."

They also suggest that Chinese hackers may have been involved in setting up the network.

"It's probably not correct to say that this threat comes from Russia," says Alexei Lukatsky, a consultant for CISCO in Russia.

"The servers are situated in Russia and in Germany, but when we're talking about hosting servers, any company or any person from any part of the world can actually do it. The Internet has no borders.... The same is true about the claim of Chinese traces. The only context where Chinese experts can be mentioned here is the fact that the vulnerabilities used for this type of programs were identified first by Chinese specialists," Mr. Lukatsky says.

This is the second time Kaspersky has uncovered a major global cyber threat, which could raise questions among the suspicious-minded about whether it may be acting as a cat's paw, or even agent, for Russian intelligence interests. Its exposure of Flame last year was probably quite untimely from the US point of view.

"It strikes me as odd that this was exposed by a private company working on a private order," says Alexei Kondaurov, a former KGB major general. "Where are FAPSI [the former Russian equivalent of the US National Security Agency], the CIA, and other agencies that are supposed to be on top of these threats? Maybe Kaspersky is interested in advertising itself, and that's why there's so much noise about this?"

Sign up for the daily JWR update. It's free. Just click here.

Interested in a private Judaic studies instructor — for free? Let us know by clicking here.

Comment by clicking here.




© 2013, The Christian Science Monitor

Quantcast