Highly sophisticated malware isn't limited to relatively high-profile sabotage code like Stuxnet -- sometimes, it's designed to fly well under the radar. Symantec has discovered Regin, a very complex trojan that has been spying on everyone from governments to individuals since at least 2008. The malware is highly modular, letting its users customize their attacks depending on whether they need to remote control a system, get screenshots or watch network traffic. More importantly, it's uncannily good at covering its tracks. Regin is encrypted in multiple stages, making it hard to know what's happening unless you capture every stage; it even has tools to fight forensics, and it can use alternative encryption in a pinch. Researchers at Symantec suspect that the trojan is a government-created surveillance tool, since it likely took "months, if not years" to create. If it is meant for spying, though, it's not clear just who wrote the malware or why. Unlike Dragonfly and other instances of professionally-made malware, Regin's origin hasn't been narrowed down to a particular country or region. About half of the infections have taken place in Russia and Saudi Arabia, but you can also find victims across India, Iran and multiple European nations. Also, it's definitely not limited to telecoms or other high-value targets -- 48 percent of known victims are people and small businesses. While Regin could easily be part of an online espionage campaign, it's hard to rule anything out at this point. Update: Kaspersky Labs did some extra sleuthing and found that Regin can attack cellular' networks GSM base stations, mapping their infrastructure. Also, sources tell The Intercept that Belgian carrier Belgacom found the trojan on its internal networks. That's potentially worrisome -- while there's no hard evidence of a connection so far, it suggests that Britain's GCHQ may have used Regin to infiltrate Belgacom and spy on its users. via Engadget.
The auction has been closed.