Red October, the espionage campaign uncovered by Kaspersky Labs after five years of actively spying on diplomats, scientists, and governments worldwide, is using a Java exploit to infect its victims, bringing the exploit count to four in this campaign.
Seculert, an Israeli security company, said today it has investigated one of the command and control servers in the Red October infrastructure and found a website serving an exploit targeting CVE-2011-3544. The vulnerability is in Java 7 and 6 u27 and earlier. According to the CVE alert, the flaw allows remote untrusted Java Web Start applications and untrusted applets to execute malicious scripts. Oracle patched the vulnerability in October 2011.
Kaspersky Labs had previously identified three Red October exploits, all of them malicious Excel or Word documents attached to spear phishing emails. The company was alerted to the spear phishing campaign by an unidentified partner, which led them to Red October. Researchers found several hundred infections and initially identified the three exploits and upwards of 1,000 unique malware files in 30 different categories including reconnaissance, data collection, code execution, credential harvesting and more. The exploits targeted mobile devices, workstations and removable storage drives.
Continued : https://threatpost.com/en_us/blogs/java-exploit-linked-red-october-espionage-malware-campaign-011513
Related: Rocra Espionage Malware Campaign Uncovered After 5 Years of Activity
Also:
Java exploit used in Red October cyberespionage attacks
'Operation Red October' Used Java Exploit as Added Attack Weapon

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic