• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

‘Nation’ behind malware that spied on 10 countries

SoleSurvivor

Alfrescian (Inf)
Asset
Joined
Jul 23, 2012
Messages
266
Points
0

‘Nation’ behind malware that spied on 10 countries


PUBLISHED : Monday, 24 November, 2014, 10:18pm
UPDATED : Monday, 24 November, 2014, 10:18pm

Reuters

ransom_virus_1_xnyt137_32879541.jpg


Research showed that a "nation state" was probably the developer of the malware called Regin. Photo: NYT

An advanced malicious software application has been uncovered that since 2008 has been used to spy on private companies, governments, research institutes and individuals in 10 countries.

Symantec, the California-based maker of Norton antivirus products, said on Sunday its research showed that a "nation state" was probably the developer of the malware called Regin.

Symantec said Regin's design "makes it highly suited for persistent, long-term surveillance operations against targets," and was withdrawn in 2011 but resurfaced from 2013 onwards.

The malware uses several "stealth" features "and even when its presence is detected, it is very difficult to ascertain what it is doing," according to Symantec. "Many components of Regin remain undiscovered and additional functionality and versions may exist," it said.

Almost half of all infections occurred at addresses of internet service providers, the report said. It said the targets were customers of the companies rather than the companies themselves. About 28 per cent of targets were in telecoms while other victims were in the energy, airline, hospitality and research sectors.

Symantec described the malware as having five stages, each "hidden and encrypted, with the exception of the first stage". It said "each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyse and understand the threat."

Regin also uses what is called a modular approach that allows it to load custom features tailored to targets, the same method applied in other malware, such as Flamer and Weevil (The Mask). Some of its features are also similar to Duqu malware, uncovered in September 2011 and related to a computer worm called Stuxnet, discovered in 2010.

Cybersecurity is a sensitive topic for businesses in the United States, where there have been several breaches of major companies and customer information. The US government and private cyber intelligence firms have said they suspect state-backed hackers in China or Russia may be responsible.

Symantec said Russia and Saudi Arabia accounted for about half of the confirmed infections of the Regin malware. The other countries were Mexico, Ireland, India, Iran, Afghanistan, Belgium, Austria and Pakistan.


 
Back
Top