ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

TR-10 - Red October / Sputnik malware - Recommendations

TR-10 - Red October / Sputnik malware - Recommendations | ICT Security-Sécurité PC et Internet | Scoop.it

Overview

Red October is a malware family, also named Sputnik, which was detected in October 2012 by Kaspersky. It was active since 2007, installations have been spotted around the globe and targets were diplomatic and governmental agencies. The malware usually was sent by email to selected people in the respective organizations.

 

As a cover, different office file formats have been used to transport the loader of the malware, using different exploits to drop the malicious content. After several stages of unpacking, the malware is running persistently on the computer and only when it successfully probes internet connectivity, it decrypts a separate file and starts to behave maliciously: it connects to a Command and Control server, awaiting new commands or downloading and executing specific malware modules.

 

Detection

 

Currently, the domains in this document are known to be used for Command and Control activity.

 

Any hit in your organisation's Proxy or DNS log files or firewall logs during the last 6 years indicate a compromised host in your organization.

 

Proactive measures

 

- Block access to below mentioned domains and IP addresses.

 

- Reactive measures

 

- Review log files, also those from backups regarding hits on the domains / IP addresses. In case of a hit, identify and isolate the machine by unplugging it from the network. CIRCL can assist with the analysis of memory and file system dumps.

 

Read more...

Gust MEES's insight:

Stay informed...

 

Philip Verghese 'Ariel's curator insight, January 18, 2013 1:31 AM

Overview

Red October is a malware family, also named Sputnik, which was detected in October 2012 by Kaspersky. It was active since 2007, installations have been spotted around the globe and targets were diplomatic and governmental agencies. The malware usually was sent by email to selected people in the respective organizations.

Rescooped by Gust MEES from Luxembourg (Europe)
Scoop.it!

CERT gouvernemental (GOVCERT.LU)

CERT gouvernemental (GOVCERT.LU) | ICT Security-Sécurité PC et Internet | Scoop.it

Les infrastructures et réseaux de communications électroniques sont aujourd’hui le moteur principal de la croissance économique.

 

Dans sa session du 15 juillet 2011, le gouvernement en conseil a décidé la mise en place, sous l’autorité du Premier ministre, de deux nouvelles structures, un Cyber Security Board luxembourgeois ainsi qu’un CERT gouvernemental (Computer Emergency Response Team, GOVCERT.LU).

 

No comment yet.
Rescooped by Gust MEES from Luxembourg (Europe)
Scoop.it!

Octobre Rouge sur l'Alzette

Octobre Rouge sur l'Alzette | ICT Security-Sécurité PC et Internet | Scoop.it
Le Luxembourg a été mentionné comme une des victimes d’une cyberattaque connue sous le nom de code "Red October"...

 

Les investigations menées par le Computer Emergency Response Team (CERT) gouvernemental permettent de constater que l’attaque a été limitée à une machine du réseau informatique de l’État. L’analyse en détail de l’incident informatique par le CERT gouvernemental a permis de conclure que cette attaque peut être considérée comme n’étant pas exceptionnellement grave.

 

Des mesures de protection adéquates ont été mises en place, qui ont permis un arrêt immédiat de transferts illicites de données. Le gouvernement rappelle dans ce contexte que les mesures tant proactives que réactives mises en œuvre par les services compétents du gouvernement, notamment le Centre des technologies de l’information de l’État, ont permis de maîtriser l’attaque en question.

 

Gust MEES's curator insight, January 17, 2013 12:26 PM

De bonnes infrastructures et des mesures proactives aident à contrer des attaques...

 

                           ===> Proactive Thinking! <===