⬆️ ⬇️

Regin could work for the needs of the United States and Britain

Yesterday, news about Regin's malware was published , which monitored users from various fields, including corporate users and governments. Troyan watched users from 2008 to 2011, after which he disappeared from the radar and reappeared in 2013.



In the spring of 2011, the European Commission discovered that it was hacked . The invasion was difficult to detect, using a zero-day vulnerability. Hackers entered the network, scanned the network architecture and infected numerous systems in the European Commission and the Council of Europe before they were discovered, having stolen hundreds of other documents. Two years later, in 2013, the Belgian telecommunications company Belgakom was hacked: hackers learned the logins and passwords of the company's system administrators in order to gain access to the routers controlling the cellular network of Belgakom. Further, the victim was Jean-Jacques Quisquater, a professor-cryptographer.



The NSA and the UK Government Communications Center were associated with Regin, which means they could have a hand in the aforementioned goals in 2013. The hacking of the European Commission was carried out with the help of a similar malicious code, also a multistage one, which again leads researchers from Kaspersky Lab and Symantec to think about the ill-fated Regin.

')

image





There is something more interesting: Kaspersky notes that Regin is capable of attacking and infecting GSM base stations, enabling its “owners” to intercept and listen to the calls of everyone, including the president and employees of companies.



From this we can draw the following conclusion: Regin could not only be used by American and British intelligence services, but was originally created by their order. And now intelligence uses this software, which can be customized for many different purposes - from screenshots to camera photos, on an ongoing basis, and not just in emergency situations.



Geographical location of victims, infographics from Kaspersky Lab.



image

Source: https://habr.com/ru/post/363411/



All Articles