Jan 19 2013

Red October Hackers Exploited Known Java Vulnerability

Author: admin | Category: Cyber Security, Featured, Information Security, Vulnerability Assessment | Leave a Comment

Among the attack vectors employed by those behind the Red October cyberespionage campaign was an old Java exploit. Red October, which appears to have been operational for at least five years, targeted diplomatic, military, and government data on computer systems and mobile devices. Kaspersky Labs disclosed their discovery of Red October on Monday, January 14. The research indicated that the perpetrators exploited vulnerabilities in Excel and Word to launch their attacks. On
Tuesday, a company called Securlert said that the hackers were also exploiting a known Java vulnerability that Oracle had patched in October 2011.

Please read more : Red October hackers also used Java exploit for spy campaign

Related Posts

ഇന്‍റര്‍നെറ്റ്: തട്ടിപ്പുകളുടെ പുതിയ വിഹാരഭൂമി

Security threats, every Facebook users need to be aware!


Leave a Reply

Your email address will not be published. Required fields are marked *