Malware identified by Symantec appears to be linked with the US and British Intelligence

Disclaimer: Every news/article published at Hacking Scams™ is not for hacking purposes. It is to promote awareness and to secure cyberspace. We never promote hacking through our articles. If you find anything inappropriate as similar to hacking, report us here.

A complicated cyber-spying tool has been stealing information from governments and businesses since 2008.

A malware named as ‘Regin’ is identified by security firm Symantec (Mountain View, CA). They said, it was used “in systematic spying campaigns against a range of international targets,” including businesses, researchers, government and private individuals.

Regin developers as attacker were able to perform following illegal activities on victim PCs/Laptops like capturing their screenshots, stealing their passwords, mouse control, recovering their deleted files etc.

The Intercept (News website owned by First Look Media) reported on Monday, “The malware ‘Regin’ appear to be associated with US and British intelligence, and it was used in attacks on EU government networks and Belgium’s telecom network.”

The report from ‘The Intercept’ and technical analysis highlighted that “Former National Security Agency Contractor – Edward Snowden leaked document about broad surveillance programs which referenced Regin to US and British intelligence.

“Regin is a cyberattack platform, which the attackers deploy in victim networks for total remote control at all levels, Regin also appears to have infiltrated mobile communications through GSM networks, exposing “ancient” communication protocols used by cell phone networks” said a research report from Kaspersky Lab.

Wheresoever’s NSA (National Security Agency) spokeswoman said, “We are not going to comment on rumor.”

For attacking computer networks involved in Iran’s nuclear program a tool named as ‘Stuxnet Worm’ was supposed to be used by the US and Israeli governments. “This malware ‘Regin’ shares some feature with Stuxnet worm”, said by Symantec in a report.

Due to its complication, the Symantec researchers said at their blog, “This malware would have required a significant investment of time and resources, indicating that a nation state is responsible. It is likely that its development took months, if not years, to complete and its authors have gone to great lengths to cover its tracks”.

According to Symantec, this malware has been supposed to be originated from Yahoo Instant Messenger or victims were tricked into visiting spoofed websites and to download this malware.

Spoofed websites are those website which looks similar to original website but URL is changed. For example, www.hackingscams.com is an original site but www.hackingsacms.com could be spoofed website with little spelling difference in website URL.

Different security researchers said that “All components of Regin are not believed to be discovered and there could be new versions of this malware which has not been yet detected”

Malware highest infections were reported in Russia (28 Percent) & Saudi Arabia (24 Percent) and other countries infected were Mexico, Ireland, India, Afghanistan, Iran, Belgium, Austria and Pakistan. But no infection was reported in the United States.

Folks, secure your PCs/Laptops by installing good antivirus. Otherwise malwares like ‘Regin’ will hack you.

Hacking Scams Admin Signing off for today.

Subscribe to Hacking Scams

    

Like us on Facebook

CEO and Ethical Hacker at EH1 Infotech™ | Technology Certified™ (Units of Baghla Technologies Private Limited). President at Anti Hacking Welfare Society, India. Founder, Author and Editor at Hacking Scams™. Visit his Official Website. Stay alert people, it's time to fight back against hacking scams and security threats.

  • Facebook(0)
  • Google Plus(0)
  • Disqus(0)
Join Our Mailing List

Don’t miss latest Hacking and Security news delivered at your email from the cluster of Hacking Scams™ articles.

Enter your email address:

CLOSE