Sophisticated ‘State-sponsored’ Regin Spy Tool Discovered

IT security specialist Symantec has uncovered a new piece of malware, reminiscent of Stuxnet and Duqu, which bears the hallmarks of a state-sponsored operation and is believed to have been in use since at least 2008.

Dubbed ‘Regin’ by Symantec, this backdoor-type Trojan is being used as an espionage and surveillance tool, operating with a level of sophistication rarely seen. Notably, most of its code is not visible on infected computers, and it goes to great lengths to hide the data it’s stealing.

Regin’s targets

Regin’s targets include government organisations, infrastructure operators, businesses, academics and private individuals.

A Symantec spokesperson described Regin as customisable with an extensive range of capabilities depending on the target. They added: “It provides its controllers with a powerful framework for mass surveillance and has been used in spying operations against government organizations, infrastructure operators, businesses, researchers, and private individuals.

A Symantec blog post describing the Trojan read: “It is likely that its development took months, if not years, to complete and its authors have gone to great lengths to cover its tracks. Its capabilities and the level of resources behind Regin indicate that it is one of the main cyber espionage tools used by a nation state.

“Backdoor.Regin is a multi-staged threat and each stage is hidden and encrypted, with the exception of the first stage.  Executing the first stage starts a domino chain of decryption and loading of each subsequent stage for a total of five stages.  Each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyse and understand the threat.”

The Symantec spokesperson added: “The discovery of Regin highlights how significant investments continue to be made into the development of tools for use in intelligence gathering. Symantec believes that many components of Regin remain undiscovered and additional functionality and versions may exist.”

Additional analysis continues and Symantec will post any updates on future discoveries.

Duncan Macrae

Duncan MacRae is former editor and now a contributor to TechWeekEurope. He previously edited Computer Business Review's print/digital magazines and CBR Online, as well as Arabian Computer News in the UAE.

Recent Posts

Russia Accused Of Cyberattack On Germany’s Ruling Party, Defence Firms

German foreign minister warns Russia will face consequences for “absolutely intolerable” cyberattack on ruling party,…

2 days ago

Alphabet Axes Hundreds Of Staff From ‘Core’ Organisation

Google is reportedly laying off at least 200 staff from its “Core” organisation, including key…

2 days ago

Apple Announces Record Share Buyback, Amid iPhone Sales Decline

Investor appeasement? Apple unveils huge $110 billion share buyback program, as sales of iPhone decline…

2 days ago

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

3 days ago

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

3 days ago