BERLIN (Reuters) – A newly discovered spyware has spied over years businesses and governments, especially in Russia and Saudi Arabia. The program is so complex and expensive that only States that are potential client in question, said late Sunday that IT security firm Symantec, who had discovered the software. Well, every fourth infection met accordingly operators of telecommunications networks. The attacker would have gotten to some extent access to call data. Symantec gave the software named “Regin”.
The program is infected computers in several steps firm and is trimmed out long to remain undetected. “Even if you discover it, it is very difficult to determine what it does,” said Symantec. Meanwhile, the company was able to make “Regin” on computers locate it said. At the same time, Symantec believes that there are still undiscovered functions and options of the software.
The hidden acting Trojan program can make according to security researchers, among other recordings from the screen, steal passwords, monitor traffic and for the attacker to recover deleted files. The tasks of the software can be adapted to the target.
Russia was the hardest hit with 28 percent of the cases, followed by Saudi Arabia with 24 percent, said Symantec. Thereafter, Ireland and Mexico follow with nine percent and India with five percent. Symantec’ve found so far no direct evidence for the authorship of “Regin,” said Symantec expert Candid Wüest. Of level of development and the goals came forth intelligence about the US, Israel or China in question. The software was active from 2008 to 2011, then was in 2013 a new version appeared.
About half of the previously discovered “Regin” infections attributable to individuals and small businesses. In addition, airlines, research facilities and the energy industry and the hotel industry were affected. The stolen information would be stored encrypted and transmitted. The resulting traffic is one of the few references to track the spy program.
“Regin” play technically in the same league as the sabotage program “Stuxnet”, which once undermined Iran’s nuclear program, said Symantec , Behind “Stuxnet” Israeli and American intelligence are suspected. The development of “Regin” probably months, if not have taken years, estimated IT security experts / so / DP / stk
Source:. Dpa-AFX
No comments:
Post a Comment