{"id":178071,"date":"2015-01-27T11:03:02","date_gmt":"2015-01-27T16:03:02","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/link-between-nsa-and-regin-cyberespionage-malware-becomes-clearer.php"},"modified":"2015-01-27T11:03:02","modified_gmt":"2015-01-27T16:03:02","slug":"link-between-nsa-and-regin-cyberespionage-malware-becomes-clearer","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/link-between-nsa-and-regin-cyberespionage-malware-becomes-clearer.php","title":{"rendered":"Link between NSA and Regin cyberespionage malware becomes clearer"},"content":{"rendered":"<p><p>  Security researchers found a strong connection between Regin and  a keylogger used by the Five Eyes intelligence alliance<\/p>\n<p>    Keylogging malware that may have been used by the NSA shares    signficant portions of code with a component of Regin, a    sophisticated platform that has been used to spy on businesses,    government institutions and private individuals for years.  <\/p>\n<p>    The keylogger program, likely part of an attack framework used    by the U.S. National Security Agency and its intelligence    partners, is dubbed QWERTY and was among the files that former    NSA contractor Edward Snowden leaked to journalists. It was    released by German news magazine Der Spiegel on Jan. 17    along with a larger collection of secret documents about        the malware capabilities of the NSA and the other Five Eyes    partners -- the intelligence agencies of the U.K., Canada,    Australia and New Zealand.  <\/p>\n<p>    \"We've obtained a copy of the malicious files published by Der    Spiegel and when we analyzed them, they immediately reminded us    of Regin,\" malware researchers from antivirus firm Kaspersky    Lab said Tuesday in     a blog post. \"Looking at the code closely, we conclude that    the 'QWERTY' malware is identical in functionality to the Regin    50251 plugin.\"  <\/p>\n<p>    Moreover, the Kaspersky researchers found that both QWERTY and    the 50251 plug-in depend on a different module of the Regin    platform identified as 50225 which handles kernel-mode hooking.    This component allows the malware to run in the highest    privileged area of the operating system -- the kernel.  <\/p>\n<p>    This is strong proof that QWERTY can only operate as part of    the Regin platform, the Kaspersky researchers said.    \"Considering the extreme complexity of the Regin platform and    little chance that it can be duplicated by somebody without    having access to its source code, we conclude the QWERTY    malware developers and the Regin developers are the same or    working together.\"  <\/p>\n<p>    Der Spiegel reported that QWERTY is likely a plug-in of a    unified malware framework codenamed WARRIORPRIDE that is used    by all Five Eye partners. This is based on references in the    code to a dependency called WzowskiLib or CNELib.  <\/p>\n<p>    In a    separate leaked document authored by the Communications    Security Establishment Canada, the Canadian counterpart of the    NSA, WARRIORPRIDE is described as a flexible computer network    exploitation (CNE) platform that's an implementation of the    \"WZOWSKI\" Five Eyes API (application programming interface).  <\/p>\n<p>    The document also notes that WARRIORPRIDE is known under the    code name DAREDEVIL at the UK Government Communications    Headquarters (GCHQ) and that the Five Eyes intelligence    partners can create and share plug-ins for it.  <\/p>\n<p>    The newly discovered link between QWERTY and Regin suggests    that the cyberespionage malware platform security researchers    call Regin is most likely WARRIORPRIDE.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.computerworld.com.au\/article\/564820\/link-between-nsa-regin-cyberespionage-malware-becomes-clearer\/?utm_medium=rss&utm_source=taxonomyfeed\/RK=0\/RS=eG_pKUYfHg5o9RmPc9M3hEo9VF8-\" title=\"Link between NSA and Regin cyberespionage malware becomes clearer\">Link between NSA and Regin cyberespionage malware becomes clearer<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Security researchers found a strong connection between Regin and a keylogger used by the Five Eyes intelligence alliance Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years. The keylogger program, likely part of an attack framework used by the U.S <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/link-between-nsa-and-regin-cyberespionage-malware-becomes-clearer.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-178071","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/178071"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=178071"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/178071\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=178071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=178071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=178071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}