Red October Hackers Exploited Known Java Vulnerability
Author: admin | Category: Cyber Security, Featured, Information Security, Vulnerability Assessment | Leave a Comment
Among the attack vectors employed by those behind the Red October cyberespionage campaign was an old Java exploit. Red October, which appears to have been operational for at least five years, targeted diplomatic, military, and government data on computer systems and mobile devices. Kaspersky Labs disclosed their discovery of Red October on Monday, January 14. The research indicated that the perpetrators exploited vulnerabilities in Excel and Word to launch their attacks. On
Tuesday, a company called Securlert said that the hackers were also exploiting a known Java vulnerability that Oracle had patched in October 2011.
Please read more : Red October hackers also used Java exploit for spy campaign