Red October – Indicators of Compromise and Mitigation DataJanuary 21st, 2013 | Posted by in APT | Attacks | Exploits | Malware
Together with our partner, Kaspersky, we’re releasing a whitepaper on the “indicators of compromise” that can be useful to detect and mitigate the threats from Red October. It contains indicators to detect most of the Red October activity in your systems and networks. Inside the whitepaper you will find snort rules as well as an OpenIOC file that you can use to check your systems for activity related to this cyber espionage campaign.
You can follow any responses to this entry through the RSS 2.0 Both comments and pings are currently closed.