{"id":169190,"date":"2014-12-24T14:00:45","date_gmt":"2014-12-24T19:00:45","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/regin-spying-tool-linked-to-nsa-among-first-malware-meant-for-espionage.php"},"modified":"2014-12-24T14:00:45","modified_gmt":"2014-12-24T19:00:45","slug":"regin-spying-tool-linked-to-nsa-among-first-malware-meant-for-espionage","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/regin-spying-tool-linked-to-nsa-among-first-malware-meant-for-espionage.php","title":{"rendered":"Regin spying tool linked to NSA among first malware meant for espionage"},"content":{"rendered":"<p><p>    JERUSALEM     The malware known as Regin  linked to the National Security Agency as a    tool for tapping mobile phone networks and infiltrating foreign    computer systems  now appears to have been developed as early    as 15 years ago, making it among the first major pieces of    invasive computer software built to enable government    espionage.  <\/p>\n<p>    The program was revealed last month in reports from security    companies Kaspersky Lab and Symantec Corp. Soon thereafter, The    Intercept published new leaks from NSA whistleblower Edward    Snowden thatshed light on how programs such as    Regin(pronounced Re-gen)were used to collect    sensitive, technical information on more than 70 percent of the    worlds cellular networks.  <\/p>\n<p>    Between the Snowden documents and the disclosures from computer    security professionals about Regin, for the first time    researchers think theyve linked NSA wiretapping operations to    the particular tool the agency used to accomplish it, caught in    the act invading a foreign cellular network.  <\/p>\n<p>    This is the first time weve seen it for real with our own    eyes. For us it was pretty surprising, says Costin Raiu,    director of Kaspersky Labs Global Research and Analysis Team.  <\/p>\n<p>    The NSAs vast surveillance practices  stockpiling of phone    records, recording text messages, listening in on conversations    of foreign heads of state, tapping into global fiber optic    communications -- began to be revealed a year and a half ago    when the Snowden documents emerged.  <\/p>\n<p>    Now, analysis of the Regin malware provides rare insight into    how such extensive hacking and wiretapping was    accomplished.  <\/p>\n<p>    Regin is not just a worm or a virus, but a    malwareplatform, which can host many different types of    attacks. It was built for stealth and flexibility and has been    found on computers around the world, serving many different    purposes.  <\/p>\n<p>    Both Kaspersky Lab and Symantec judged Regin to not only be the    work of a nation-state, but also one of the most sophisticated,    if not the most sophisticated, pieces of malware in existence.    Both companies also specifically noted that Regin was used    against telecommunications companies and infrastructure (in    addition to a variety of other targets).  <\/p>\n<p>        Get Monitor cybersecurity news and analysis delivered        straight to your inbox.      <\/p>\n<p>    The precise way that Regin enters a computer system is still    unknown, but it may involve visiting spoofed versions of    well-known websites or a backdoor through an application.    According to Symantec, in one case log files showed that Regin    got in through an unknown exploit in Yahoo! Instant Messenger.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.csmonitor.com\/World\/Passcode\/2014\/1224\/Regin-spying-tool-linked-to-NSA-among-first-malware-meant-for-espionage\/RK=0\/RS=f.CTnFrajj7Gf6l4a_D.ex2W5po-\" title=\"Regin spying tool linked to NSA among first malware meant for espionage\">Regin spying tool linked to NSA among first malware meant for espionage<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> JERUSALEM The malware known as Regin linked to the National Security Agency as a tool for tapping mobile phone networks and infiltrating foreign computer systems now appears to have been developed as early as 15 years ago, making it among the first major pieces of invasive computer software built to enable government espionage. The program was revealed last month in reports from security companies Kaspersky Lab and Symantec Corp <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/regin-spying-tool-linked-to-nsa-among-first-malware-meant-for-espionage.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-169190","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/169190"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=169190"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/169190\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=169190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=169190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=169190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}