'Regin' stealth malware has been spying on governments for years

On Monday, security researchers announced the existence of 'Regin,' a sophisticated malware program that has spied on governments and research institutions in Russia, Saudi Arabia, and a handful of other countries. Regin is so complex that it was probably written by a country – most likely the US, Israel, or the UK.

|
David Becker/AP/File
The Regin malware has been active since 2008, gaining access to government and institutional communications networks. Here, a software engineer demonstrates a vulnerability in a phone app at the Black Hat USA 2014 cyber security conference.

A new piece of computer malware called “Regin” has been uncovered by security researchers at Symantec, who say the software has been active since 2008, spying on governments and individuals in 10 countries, including Russia and Saudi Arabia. Regin allows for mass surveillance, and is so sophisticated that researchers say it probably took months or years to develop.

Regin is apparently designed to gain access to the phone calls of governments, small businesses, financial and research institutions, and specific individuals. It is highly targeted – fewer than 100 infections have been discovered worldwide in the last six years – and isn’t designed to steal sensitive information or to destroy important systems. As far as researchers can tell, Regin is meant to run in the shadows, watching its targets.

Symantec calls the malware “a highly complex threat which has been used in systematic data collection or intelligence gathering campaigns.”

Most of Regin’s discovered targets live in Russia (28 percent), Saudi Arabia (24 percent), or Ireland (9 percent). Symantec has also found infected systems in Mexico, Austria, Belgium, India, Afghanistan, Pakistan, and Iran. No one living in the US, Canada, or the UK has been infected, which leads researchers to believe that Regin wasn’t created by the “usual suspects,” China or Russia, Mikko Hypponen, chief research officer at antivirus company F-Secure, told The Guardian. Regin is so complex that it was probably created by a country, rather than an individual or hacker group, says Mr. Hyppönen. And if it didn’t come from China or Russia, he says, that means it was probably written by the US, Israel, or the UK.

Regin uses five stages to take control of computers and other telecommunications devices, installing itself as a Trojan horse – meaning that it hides inside another apparently innocuous piece of software – then loading subsequent stages with custom features such as a Web traffic monitor and a data sniffer that allows it to hook in to cellphone networks. In that respect, it’s similar to the Stuxnet worm that infected nuclear control systems in Iran in 2010, and the Duqu malware, discovered in 2011, that gathered information about industrial systems.

Besides being careful not to install software from sources you don’t recognize, there’s probably nothing you need to do to protect your computer against Regin specifically. The malware is aimed at enabling large-scale surveillance, not stealing personal credit card information or other data. The handful of individuals who have been reported to have been infected work in the fields of cryptography or mathematical analysis.

Because Regin is such a complicated piece of software, Symantec says the malware may have additional functions that haven’t been discovered yet. Even when an infection has been recognized, it adds, it’s difficult to know exactly what Regin is doing since each stage helps to hide the others from view. For now, individuals living outside of the affected countries probably don’t need to worry – but governments may need to take extra steps to ensure their computer and phone systems are secure.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to 'Regin' stealth malware has been spying on governments for years
Read this article in
https://www.csmonitor.com/Technology/2014/1124/Regin-stealth-malware-has-been-spying-on-governments-for-years
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe