Advanced cyberspying tool dates from 2008: researchers

Image
AFP Washington
Last Updated : Nov 24 2014 | 5:46 PM IST
A highly sophisticated cyberspying tool has been used since 2008 to steal information from governments, businesses and others, security researchers said today.
The security firm Symantec said the malware, known as Regin, was seen "in systematic spying campaigns against a range of international targets," including governments infrastructure operators, businesses, researchers and private individuals.
Symantec said the malware shares some characteristics with
The Stuxnet worm - a tool believed to have been used by the US and Israeli governments to attack computer networks involved in Iran's nuclear program.
Because of its complexity, the Symantec researchers said in a blog post that the malware "would have required a significant investment of time and resources, indicating that a nation state is responsible."
The researchers added that "it is likely that its development took months, if not years, to complete and its authors have gone to great lengths to cover its tracks."
They described Regin as "a multi-staged threat," with each stage hidden and encrypted.
Each individual stage provides little information on the package and "only by acquiring all five stages is it possible to analyse and understand the threat," the researchers said.
Lurking in shadows -"Regin's developers put considerable effort into making it highly inconspicuous," Symantec said.
"Its low key nature means it can potentially be used in espionage campaigns lasting several years. Even when its presence is detected, it is very difficult to ascertain what it is doing. Symantec was only able to analyse the payloads after it decrypted sample files."
The researchers also said many components of Regin are still probably undiscovered and that there could be new versions of this tool which have not yet been detected.
The infections occurred between 2008 and 2011, after which the malware disappeared before a new version surfaced in 2013.
The largest number of infections discovered - 28 per cent - was in Russia, and Saudi Arabia was second with 24 per cent.
Other countries where the malware was found included Mexico, Ireland, India, Afghanistan, Iran, Belgium, Austria and Pakistan. There were no reported infections in the United States.
Around half of all infections occurred at addresses belonging to Internet service providers, but Symantec said it believes the targets of these infections were customers of these companies rather than the companies themselves.
Telecom companies were also infected, apparently to gain access to calls being routed through their infrastructure, the report noted.
*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Nov 24 2014 | 5:46 PM IST

Next Story