The 追跡(する) for Red October: The astonishing 切り開く/タクシー/不正アクセスing (犯罪の)一味 that has infiltrated over 1,000 high level 政府 computers around the world

  • 研究員s say the cyber attack has been in 操作/手術 since 2007 - and is still running
  • 操作/手術 述べるd as '大規模な' and has stolen 'several terabytes' of data
  • 安全 会社/堅い which discovered the attacks (人命などを)奪う,主張するs there is 'strong technical 証拠 the 攻撃者s have ロシアの-speaking origins'- but say a 私的な 会社/堅い or rogue nation could be behind the 網状組織.
  • 的s 含むd 外交の and 政治の 機関s of さまざまな countries across the world, 研究 会・原則s, energy and 核の groups, and 貿易(する) and 航空宇宙学 会社/堅いs

宣伝

A major cyber-attack that has been stealing (警察などへの)密告,告訴(状) from high level 政府 computers around the world since 2007 has been discovered.

Kaspersky Labs, which made the 発見, said in 新規加入 to 外交の and 政治の 機関s of さまざまな countries across the world, Red October also 的d 研究 会・原則s, energy and 核の groups, and 貿易(する) and 航空宇宙学 的s.

The 会社/堅い even said the malware was used to infiltrate smartphones of 政府 労働者s to electronically steal (警察などへの)密告,告訴(状).

The full extent of the Red October operation is revealed in this infographic, showing how it has hit countries across the globe

The 十分な extent of the Red October 操作/手術 is 明らかにする/漏らすd in this infographic, showing how it has 攻撃する,衝突する countries across the globe

WHAT HAS BEEN STOLEN?

The main 客観的な of the 攻撃者s was to gather 極度の慎重さを要する 文書s from the 妥協d organisations.

This 含むd geopolitical 知能, 信任状 to 接近 分類するd computer systems, and data from personal 動きやすい 装置s and 網状組織 器具/備品.

全体にわたる, Kaspersky said over 7 terabytes, or 7,000GB data has been stolen.

The 最初の/主要な 焦点(を合わせる) of the (選挙などの)運動をする was 的ing countries in eastern Europe.

'Former USSR 共和国s and countries in Central Asia were 的d, although 犠牲者s can be 設立する everywhere, 含むing Western Europe and North America', said Kaspersky Lab, an antivirus ソフトウェア 会社/堅い which made the 発見.

'The main 客観的な of the 攻撃者s was to gather 極度の慎重さを要する 文書s from the 妥協d organisations, which inc luded geopolitical 知能, 信任状 to 接近 分類するd computer systems, and data from personal 動きやすい 装置s and 網状組織 器具/備品,'

Red October, which has been active since at least 2007, appears to collect とじ込み/提出するs encrypted with ソフトウェア used by several (独立の)存在s from the European Union to Nato.

Kaspersky said Red October also 感染させるd smartphones, 含むing iPhones, Windows 動きやすい and Nokia handsets.

It is believed to be still operating, although since the 研究 was published, the 攻撃者s are believed to have started 取り去る/解体するing the system to 保護する their 身元s.

'The 事業/計画(する) started in October 2012, we received a 怪しげな executable from a partner,' Vitaly Kamluk, 長,指導者 Malware 専門家 at Kaspersky Lab told MailOnline.

'We checked and began to understand what we had was やめる 大規模な - we 設立する 1,000 different とじ込み/提出するs in a few weeks, each of them a personalised email.'

Mr Kamluk said the attacks were 高度に customised.

'There are a very 限られた/立憲的な number of machines, around 1,000 around the world, but every 的 is carefully selected.'

'We 抽出するd language used and 設立する Broken English was used, with ロシアの words thrown in, such as Proga, 一般的に used の中で ロシアの programmers.

'However, we are not pointing fingers at Russia - just that ロシアの language has been spotted.

'It could be any organisation or country behind this, it could be nation 明言する/公表するs or a 私的な 商売/仕事 or 犯罪の group.

HOW RED OCTOBER WORKS ?

One of the fake emails used to infect computers

One of the 偽の emails used to 感染させる computers

Red October is a malware attack.

最初 the malicious code was 配達するd 経由で e-mail as attachments (Microsoft Excel, Word and, probably PDF 文書s) which were rigged with 偉業/利用する code for known 安全 vulnerabilities in the さまざまな 使用/適用s.

ーするつもりであるd 的s received personalised correspondence based on gathered 知能 on individual people (an example is on the 権利).

These attacks 構成するd of two major 行う/開催する/段階s:

初期の 感染: 権利 after the 犠牲者 opens the malicious 文書 on a 攻撃を受けやすい system, the embedded malicious code 始めるs the 体制/機構 of the main Red October ソフトウェア on the machine.

This 扱うs その上の communication with the master servers run by the hackers, and can 生き残る the computer 存在 再開するd.

秘かに調査するing: Next, the system receives a number of 付加 秘かに調査する modules from the hacker's server, 含むing modules to 扱う 感染 of smartphones - the team said iPhones, Windows phones and Nokia handsets were seen on the 網状組織.

The 明確な/細部 modules are customised for each 動きやすい depending on the infomration the hackers 手配中の,お尋ね者.

The main 目的 of the 秘かに調査するing modules is to steal (警察などへの)密告,告訴(状).

All gathered (警察などへの)密告,告訴(状) is packed, encrypted and only then transferred to the Red October 命令(する) servers.

Other modules were designed to 的 とじ込み/提出するs encrypted using a system known as Cryptofiler - an encryption 基準 that used to be in 普及した use by 知能 機関s but is now いっそう少なく ありふれた

The (選挙などの)運動をする, identified as 'Rocra', short for 'Red October', is 現在/一般に still active with data 存在 sent to 多重の 命令(する)-and-支配(する)/統制する servers, through a configuration which 競争相手s in 複雑さ the 組織/基盤/下部構造 of the 炎上 malware.

Kaspersky's 研究 示すd there were 55,000 関係 的s within 250 different IP 演説(する)/住所s.

Most 感染 関係s were 設立する coming from Switzerland, followed by カザフ共和国 and Greece.


'There is senstitive geopolitical (警察などへの)密告,告訴(状) 存在 stolen, which is very 価値のある,' said Mr Kamluk.

Kaspersky 見積(る) there were 20-30 developers working 十分な time on this, and all were 'very experienced programmers'.

'Over the course of the last five years, we believe several terabytes of data was stolen - it's 大規模な.

'Since we published the 報告(する)/憶測, we have seen some of the servers are no longer 答える/応じるing.'

The 会社/堅い is now working with l aw 施行 機関s to shut 負かす/撃墜する the remaining servers.

Red October, which is 指名するd after the ロシアの 潜水艦 featured in the Tom Clancy novel The 追跡(する) For Red October, also has what Kaspersky Lab called a unique 'resurrection' module that hid in Adobe Reader and Microsoft Office programmes that 許すd the 攻撃者s to 回復する 接近 if the ウイルス was discovered and 除去するd.




The comments below have not been 穏健なd.

The 見解(をとる)s 表明するd in the contents above are those of our 使用者s and do not やむを得ず 反映する the 見解(をとる)s of MailOnline.

We are no longer 受託するing comments on this article.