Stealthy spy software 'Regin' snooping for years: Symantec

Published November 26, 2014
Regin operates on 6 levels control the mouse take screenshots Regin can recover deleted files steal passwords. Only the Trojan horse that gains access is visible. The others are encrypted. Confirmed infections in Russia, Saudi Arabia, Mexico, Ireland, India, Afghanistan, Iran, Belgium, Austria and Pakistan. - AFP
Regin operates on 6 levels control the mouse take screenshots Regin can recover deleted files steal passwords. Only the Trojan horse that gains access is visible. The others are encrypted. Confirmed infections in Russia, Saudi Arabia, Mexico, Ireland, India, Afghanistan, Iran, Belgium, Austria and Pakistan. - AFP
Regin operates on 6 levels control the mouse take screenshots Regin can recover deleted files steal passwords. Only the Trojan horse that gains access is visible. The others are encrypted.  - AFP
Regin operates on 6 levels control the mouse take screenshots Regin can recover deleted files steal passwords. Only the Trojan horse that gains access is visible. The others are encrypted. - AFP

SAN FRANCISCO: Computer security firm Symantec on Monday said it uncovered stealthy software wielded as part of a years-long spying campaign, most likely by a nation state.

The malicious software, dubbed Regin, has a rare level of sophistication and has been targeting government agencies, telecoms, utilities, airlines, research facilities, private individuals and others since at least 2008, according to Symantec Corporation.

Attacks on telecom firms appeared aimed at getting access to calls being routed through networks.

“Regin is a highly complex threat which has been used in systematic data collection or intelligence gathering campaigns,” the Silicon Valley-based computer security firm said in a paper detailing the threat.

“The development and operation of this malware would have required a significant investment of time and resources, indicating that a nation state is responsible. “Regin was found mainly in 10 countries, but more than half of infections discovered were in Russia and Saudi Arabia, according to Symantec researchers.

Regin's capabilities include letting hackers snap screen-shots, steal passwords, monitor network traffic, take files or tap into mobile telephone calls, researchers said.

The “backdoor-type Trojan” takes great measures to hide its presence as well as any data it is stealing, according to Symantec.

“Regin's developers put considerable effort into making it highly inconspicuous,” the report said.

“Its low key nature means it can potentially be used in espionage campaigns lasting several years. “Regin may have taken years to make, according to Symantec, which said the tool could be used for mass surveillance.

Nearly half the infections discovered targeted small businesses and private individuals.

Researchers found Regin infected a variety of organizations from 2008 to 2011, only to be withdrawn, though a new version of the malicious software appeared last year.

Symantec did not indicate who it thought might be behind the cyber-espionage tool.

 Regin operates on 6 levels control the mouse take screenshots Regin can recover deleted files steal passwords. Only the Trojan horse that gains access is visible. The others are encrypted. Confirmed infections in Russia, Saudi Arabia, Mexico, Ireland, India, Afghanistan, Iran, Belgium, Austria and Pakistan.   - AFP
Regin operates on 6 levels control the mouse take screenshots Regin can recover deleted files steal passwords. Only the Trojan horse that gains access is visible. The others are encrypted. Confirmed infections in Russia, Saudi Arabia, Mexico, Ireland, India, Afghanistan, Iran, Belgium, Austria and Pakistan. - AFP

Opinion

Editorial

New IMF programme?
Updated 03 Jun, 2023

New IMF programme?

The tranche’s release is crucial to the government’s plans to provide relief to the public in the budget.
Pemra’s edict
03 Jun, 2023

Pemra’s edict

IN an effort to mould the narrative, and prevent “undesirable” opinions from making it to the airwaves, Pemra ...
Crypto dreams
03 Jun, 2023

Crypto dreams

THOUGH the majority of the global financial community has wholeheartedly embraced the promise of cryptocurrencies,...
Balanced approach
Updated 02 Jun, 2023

Balanced approach

Only a legitimate government may be able to take the country out of its present crisis.
Rise in attacks
02 Jun, 2023

Rise in attacks

AN enduring security dilemma for Pakistan has been the issue of cross-border havens in Afghanistan for militants,...
Narrowing the gap
02 Jun, 2023

Narrowing the gap

THE rupee made a substantial recovery of 11.5 against the dollar in the open market a day after the State Bank...