Author Topic: The enigma of Regin  (Read 625 times)

0 Members and 1 Guest are viewing this topic.

Offline Axon

  • VIP
  • King
  • *
  • Posts: 2047
  • Cookies: 319
    • View Profile
The enigma of Regin
« on: November 26, 2014, 08:39:14 pm »
This is the most recent discovery in cyber espionage threats. Another highly sophisticated malicious platform. You will only comprehend the level of sophistication if you read the Kaspersky report.

Quote
A leading computer security company says it has discovered one of the most sophisticated pieces of malicious software ever seen. Symantec says the bug, named Regin, was probably created by a government and has been used for six years against a range of targets around the world.

Once installed on a computer, it can do things like capture screenshots, steal passwords or recover deleted files. Experts say computers in Russia, Saudi Arabia and Ireland have been hit most. It has been used to spy on government organisations, businesses and private individuals, they say.

Researchers say the sophistication of the software indicates that it is a cyber-espionage tool developed by a nation state. They also said it likely took months, if not years, to develop and its creators have gone to great lengths to cover its tracks. Sian John, a security strategist at Symantec, said: "It looks like it comes from a Western organisation. It's the level of skill and expertise, the length of time over which it was developed." Symantec has drawn parallels with Stuxnet, a computer worm thought to have been developed by the US and Israel to target Iran's nuclear program. That was designed to damage equipment, whereas Regin's purpose appears to be to collect information.
http://www.bbc.com/news/technology-30171614

Regin: Top-tier espionage tool enables stealthy surveillance
http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance

Kaspersky full report.
https://securelist.com/files/2014/11/Kaspersky_Lab_whitepaper_Regin_platform_eng.pdf

The usual suspects ::)
http://www.zdnet.com/now-we-know-who-developed-state-sponsored-regin-malware-7000036111/

Offline Xires

  • Noob Eater
  • Administrator
  • Knight
  • *
  • Posts: 379
  • Cookies: 149
    • View Profile
    • Feed The Trolls - Xires
Re: The enigma of Regin
« Reply #1 on: November 26, 2014, 09:11:53 pm »
K, first..fsck Norton.  They've paid people for years to code virii for them to release on the unsuspecting public.  I don't trust them to 'discover' anything on their own.  Also, Reign isn't that complex.
-Xires

Offline Axon

  • VIP
  • King
  • *
  • Posts: 2047
  • Cookies: 319
    • View Profile
Re: The enigma of Regin
« Reply #2 on: November 26, 2014, 10:01:02 pm »
K, first..fsck Norton.  They've paid people for years to code virii for them to release on the unsuspecting public.  I don't trust them to 'discover' anything on their own.  Also, Reign isn't that complex.

i beg to differ? first, Symantic and Kaspersky discovered this malicious software, so this isn't exclusively Norton? Second, read the Kaspersky report. They explain how complex this malicious software,especially the ability to target GSM base station.

Offline Xires

  • Noob Eater
  • Administrator
  • Knight
  • *
  • Posts: 379
  • Cookies: 149
    • View Profile
    • Feed The Trolls - Xires
Re: The enigma of Regin
« Reply #3 on: November 26, 2014, 11:19:10 pm »
Actually, I meant to say that it's not that new, but I was originally typing it as "Also, Reign may be complex but isn't really a new concept." and then made changes to the sentence(because I realized that it was leading to an unnecessarily long explanation) and somehow confused myself.  The resulting sentence was not as intended.  However, now I feel the need to lightly defend my position, including my mistake.

Once upon a time, we used to code virii that employed dynamic reconfiguration, tiny built-in editors, modular architecture, and even basic AI.  It was a common occurrence to create monitoring modules to determine normal operating behavior so that it could determine, automatically, the best way to remain hidden.  Worms would utilize this information to determine the best way to spread.  Remote reporting, control & update capabilities were commonplace.  In one case we even created something specifically designed to take advantage of a hardware manufacturing flaw to deliberately fry a CPU & destroy a monitor.  If it didn't create a fire, it would at least create smoke, causing fire alarms to go off & sprinklers to spray every workstation in a department.  Various functions would often be added to help ensure that the computer was running optimally.  If the computer started getting slow due to less than optimal settings, a virus could make small changes to bring things back up to speed.  Some virii would employ methods to ensure that there was no other infection on the system.

This was all back in the early-to-mid 90s, well before multicore processors and hyperthreading.  These days antivirus companies act like virus coders in the past were idiots though they were bending entire networks to their will, sometimes creating all new communication protocols to do so, long before much of the technology that one might take advantage of now ever existed.  As detection techniques & technology have evolved, researchers are beginning to become aware of infections that echo of the art that remained hidden, underground, for so long.  These are not new concepts and, though they may seem quite complex compared to the normal drivel that is commonly cranked out(like people @ HF might be pushing), they're no more complex than what has been around for decades; they merely use newer technology.

And my opinion on Norton comes from personal experience.  However, as mentioned, I wouldn't trust them to discover anything on their own.  Don't get me wrong; their analysts are certainly not idiots.  But when Symantec says that they 'discovered' something alone, part of me always wonders if they knew about it before-hand because they'd paid someone to create it.

Regardless, all the information you've provided is quite interesting and it's a good topic.  Have a cookie.
-Xires

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: The enigma of Regin
« Reply #4 on: November 27, 2014, 09:36:12 am »
And here we go again, funny how we are so called 'allies'
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline Comm4nd0

  • /dev/null
  • *
  • Posts: 19
  • Cookies: -1
    • View Profile
Re: The enigma of Regin
« Reply #5 on: November 27, 2014, 01:09:35 pm »
why don't they just say, america has made another one...

Offline madf0x

  • Knight
  • **
  • Posts: 172
  • Cookies: 50
    • View Profile
Re: The enigma of Regin
« Reply #6 on: November 27, 2014, 04:09:45 pm »
why don't they just say, america has made another one...

Because america isn't the only place that can write these things? Bout the only thing we can really say at the moments is that the authors spoke english judging by the 'shit' and some of the module names that got left behind in the binary(which all of course could be misdirection).

-----------

As I wrote this, finished reading the last link that was posted and seems that theres some strong evidence that it was used by the US and the UK working together. Don't know which one wrote it or if both had a hand in development but they seemed to have to worked together in it's deployment at least one European country.