Stuxnet-Level Malware Spying on State Networks
Russian sites hit hardest by 'Red October' in recent years, says Kaspersky Labs
By John Johnson, Newser Staff
Posted Jan 15, 2013 4:03 PM CST
   (Shutterstock)

(Newser) – A highly sophisticated network of hackers has been spying on hundreds of diplomatic computers around the world unnoticed for about five years, reports the Christian Science Monitor. The "Red October" malware being used is on par with the notorious Stuxnet and Flame viruses, but this time criminals—as opposed to governments—may be behind it, says Russian Internet security firm Kaspersky Labs. Sites in Russia and the former Soviet satellite states have been the most frequent targets, but the US has seen a handful of attacks, too.

"This is the first attack that can be compared, judging by its complexity, with state-sponsored attacks like Flame," says an expert with Kaspersky. Details on exactly what got stolen are skimpy, but embassies, trade centers, nuclear research centers, and oil and gas facilities were targets, reports TheNextWeb. The attackers appear to have "Russian-speaking origins," but the software used suggests that Chinese hackers also played a role. Kaspersky provides the nitty gritty of its findings here.

More From Newser
My Take on This Story
To report an error on this story,
notify our editors.
Stuxnet-Level Malware Spying on State Networks is...
9%
36%
1%
6%
46%
1%
Show results without voting
You Might Like
Comments
Showing 3 of 4 comments
Observer
Jan 16, 2013 8:09 AM CST
Of course this is happening. Network weaknesses are not secret and some very rich bad guys will pay a lot more than a shitty government job. Not all brains work for God and country. Not hardly.
right2dave
Jan 15, 2013 5:34 PM CST
I blame Al Gore....
elchucko
Jan 15, 2013 5:21 PM CST
I blame finkster ;)