Red October - Indicators of Compromise and Mitigation Data

January 21, 2013  |  Jaime Blasco

Together with our partner, Kaspersky, we’re releasing a whitepaper on the “indicators of compromise” that can be useful to detect and mitigate the threats from Red October. It contains indicators to detect most of the Red October activity in your systems and networks. Inside the whitepaper you will find snort rules as well as an OpenIOC file that you can use to check your systems for activity related to this cyber espionage campaign.

Link to the whitepaper

OpenIOC file

Read more from Red October

Share this with others

Get price Free trial