Meet Red October, the newest cyber espionage operation

Shocker! It looks like the Russians might be cyber spying on the countries that make up their former empire. IT security firm Kaspersky Lab just announced that it has found a new cyber espionage tool called Rocra. The malware, active since 2007, targets mostly former USSR states and Eastern European countries, along with a limited ...

By , a former national security reporter for Foreign Policy.
Kaspersky Lab
Kaspersky Lab
Kaspersky Lab

Shocker! It looks like the Russians might be cyber spying on the countries that make up their former empire. IT security firm Kaspersky Lab just announced that it has found a new cyber espionage tool called Rocra.

Shocker! It looks like the Russians might be cyber spying on the countries that make up their former empire. IT security firm Kaspersky Lab just announced that it has found a new cyber espionage tool called Rocra.

The malware, active since 2007, targets mostly former USSR states and Eastern European countries, along with a limited number of diplomatic and government installations in Western Europe , North America and other places. It is designed to collect "geopolitical intelligence, credentials to access classified computer systems," and data from smartphones, routers, and even deleted info from removable disk drives as part of an espionage operation dubbed Red October (seriously), according to Kaspersky Lab’s announcement.

The lab believes the "attackers have Russian-speaking origins" based on forensic evidence found in the malware and the registration data for Rocra’s command-and-control servers. (Hey, it could be Western intelligence posing as Russian speaking spies, who knows.)

More specifically, it looks like Rocra is designed to steal access codes to classified networks at diplomatic missions, research installations, "energy and nuclear groups," and "trade and aerospace targets" (see: defense firms), according to Kaspersky. The bug is installed via targeted email attacks (spear phishing) that convince recipients to open up a Microsoft Office file that installs malware on their machines via a security flaw in Office.

Once on a victim’s computer, Rocra looks to steal passwords used to access sensitive information and even steals files from Acid Cryptofiler, cryptography software used by "NATO, the European Union, European Parliament and European Commission since 2011 to protect sensitive information," states the announcement.

"The attackers often used information exfiltrated from infected networks as a way to gain entry into additional systems," reads the announcement. "For example, stolen credentials were compiled in a list and used when the attackers needed to guess passwords or phrases to gain access to additional systems."

The best part: once Rocra is found by a victim and removed, its masters can regain access to the infected computer via a secret "Resurrection module" that has been hidden by Rocra in the machine’s copy of Office or Adobe Reader.

The module provides "a foolproof way to regain access to a target system if the main malware body is discovered and removed, or if the system is patched," states the announcement. "Once the [command and control servers] are operational again the attackers send a specialized document file (a PDF or Office document) to victims machines via email which will activate the malware again."

The good news is that Kaspersky Lab reports that it found only about 250 Rocra infections between November 2012 and now. This fairly limited number of infections echoes other advanced spy tools like miniFlame that we’ve seen recently. miniFlame is a very advanced piece of malware designed to steal loads of information from its victims found on a few dozen specifically targeted computers in the Middle East  

Just another day in the world of cyber spying.

Click here to read more on Red October.

John Reed is a former national security reporter for Foreign Policy.

More from Foreign Policy

The USS Nimitz and Japan Maritime Self-Defense Force and South Korean Navy warships sail in formation during a joint naval exercise off the South Korean coast.
The USS Nimitz and Japan Maritime Self-Defense Force and South Korean Navy warships sail in formation during a joint naval exercise off the South Korean coast.

America Is a Heartbeat Away From a War It Could Lose

Global war is neither a theoretical contingency nor the fever dream of hawks and militarists.

A protester waves a Palestinian flag in front of the U.S. Capitol in Washington, during a demonstration calling for a ceasefire in Gaza. People sit and walk on the grass lawn in front of the protester and barricades.
A protester waves a Palestinian flag in front of the U.S. Capitol in Washington, during a demonstration calling for a ceasefire in Gaza. People sit and walk on the grass lawn in front of the protester and barricades.

The West’s Incoherent Critique of Israel’s Gaza Strategy

The reality of fighting Hamas in Gaza makes this war terrible one way or another.

Biden dressed in a dark blue suit walks with his head down past a row of alternating U.S. and Israeli flags.
Biden dressed in a dark blue suit walks with his head down past a row of alternating U.S. and Israeli flags.

Biden Owns the Israel-Palestine Conflict Now

In tying Washington to Israel’s war in Gaza, the U.S. president now shares responsibility for the broader conflict’s fate.

U.S. President Joe Biden is seen in profile as he greets Chinese President Xi Jinping with a handshake. Xi, a 70-year-old man in a dark blue suit, smiles as he takes the hand of Biden, an 80-year-old man who also wears a dark blue suit.
U.S. President Joe Biden is seen in profile as he greets Chinese President Xi Jinping with a handshake. Xi, a 70-year-old man in a dark blue suit, smiles as he takes the hand of Biden, an 80-year-old man who also wears a dark blue suit.

Taiwan’s Room to Maneuver Shrinks as Biden and Xi Meet

As the latest crisis in the straits wraps up, Taipei is on the back foot.