{"id":178072,"date":"2015-01-27T11:03:03","date_gmt":"2015-01-27T16:03:03","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/source-code-reveals-link-between-nsa-and-regin-cyberespionage-malware.php"},"modified":"2015-01-27T11:03:03","modified_gmt":"2015-01-27T16:03:03","slug":"source-code-reveals-link-between-nsa-and-regin-cyberespionage-malware","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/source-code-reveals-link-between-nsa-and-regin-cyberespionage-malware.php","title":{"rendered":"Source code reveals link between NSA and Regin cyberespionage malware"},"content":{"rendered":"<p><p>    Keylogging malware that may    have been used by the NSA shares signficant portions of code    with a component of Regin, a sophisticated platform that has    been used to spy on businesses, government institutions and    private individuals for years.  <\/p>\n<p>    The keylogger program, likely    part of an attack framework used by the U.S. National Security    Agency and its intelligence partners, is dubbed QWERTY and was    among the files that former NSA contractor Edward Snowden    leaked to journalists. It was    released by German news magazine Der Spiegel on Jan. 17    along with a larger collection of secret documents about        the malware capabilities of the NSA and the other Five Eyes    partnersthe intelligence agencies of the U.K., Canada,    Australia and New Zealand.  <\/p>\n<p>    Weve obtained a copy of the    malicious files published by Der Spiegel and when we analyzed    them, they immediately reminded us of Regin, malware    researchers from antivirus firm Kaspersky Lab said Tuesday in        a blog post. Looking at the code closely, we conclude that    the QWERTY malware is identical in functionality to the Regin    50251 plugin.  <\/p>\n<p>    Moreover, the Kaspersky    researchers found that both QWERTY and the 50251 plug-in depend    on a different module of the Regin platform identified as 50225    which handles kernel-mode hooking. This component allows the    malware to run in the highest privileged area of the operating    systemthe kernel.  <\/p>\n<p>    This is strong proof that    QWERTY can only operate as part of the Regin platform, the    Kaspersky researchers said. Considering the extreme complexity    of the Regin platform and little chance that it can be    duplicated by somebody without having access to its source    code, we conclude the QWERTY malware developers and the Regin    developers are the same or working together.  <\/p>\n<p>    Der Spiegel reported that    QWERTY is likely a plug-in of a unified malware framework    codenamed WARRIORPRIDE that is used by all Five Eye partners.    This is based on references in the code to a dependency called    WzowskiLib or CNELib.  <\/p>\n<p>    In a separate leaked    document authored by the Communications Security    Establishment Canada, the Canadian counterpart of the NSA,    WARRIORPRIDE is described as a flexible computer network    exploitation (CNE) platform thats an implementation of the    WZOWSKI Five Eyes API (application programming    interface).  <\/p>\n<p>    The document also notes that    WARRIORPRIDE is known under the code name DAREDEVIL at the UK    Government Communications Headquarters (GCHQ) and that the Five    Eyes intelligence partners can create and share plug-ins for    it.  <\/p>\n<p>    The newly discovered link    between QWERTY and Regin suggests that the cyberespionage    malware platform security researchers call Regin is most likely    WARRIORPRIDE.  <\/p>\n<p>    Some experts already    suspected this based on other clues. According to Kaspersky    Lab, Regin was the malware program that     infected the personal computer of Belgian cryptographer    Jean-Jacques Quisquater in 2013. That attack was linked to    another malware attack against Belgian telecommunications group    Belgacom whose customers include the European Commission, the    European Parliament and the European Council.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.pcworld.com\/article\/2876112\/link-between-nsa-and-regin-cyberespionage-malware-becomes-clearer.html\/RK=0\/RS=DSYUMgKVwpWNu67QApHZAkU0prk-\" title=\"Source code reveals link between NSA and Regin cyberespionage malware\">Source code reveals link between NSA and Regin cyberespionage malware<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years. The keylogger program, likely part of an attack framework used by the U.S <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/source-code-reveals-link-between-nsa-and-regin-cyberespionage-malware.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-178072","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/178072"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=178072"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/178072\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=178072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=178072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=178072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}