The sophisticated malware Regin (http://www.zdnet.com/nation-state-spying-malware-revealed-7000036076/)
US&UK behind Regin (http://www.zdnet.com/now-we-know-who-developed-state-sponsored-regin-malware-7000036111/)
Quote
Blame the British and American spy agencies for the latest state-sponsored malware attack, say reporters at The Intercept.
The publication, which in the wake of Glenn Greenwald's departure from The Guardian continued to publish documents leaked by Edward Snowden, said on Monday the recently discovered malware, known as Regin, was used against targets (https://firstlook.org/theintercept/2014/11/24/secret-regin-malware-belgacom-nsa-gchq/) in the European Union.
One of those targets included Belgian telecommunications company Belgacom, which had its networks broken into (http://www.zdnet.com/belgacom-clears-up-after-hack-attempt-7000020726/) by the British spy agency the Government Communications Headquarters (GCHQ).
Regin was first publicly talked about over the weekend after Symantec discovered the "sophisticated" malware (http://www.zdnet.com/nation-state-spying-malware-revealed-7000036076/), though is understood to have been in circulation since 2008.
Compared to Stuxnet, the state-sponsored malware whose creators have never been confirmed, the recently-discovered trojan steals data from machines and networks it infects, disguised as Microsoft software.
Some began to point the finger at Russia and China (http://www.theguardian.com/technology/2014/nov/24/regin-malware-western-surveillance-technology?CMP=share_btn_tw), but these were quickly discounted by industry experts. Others suspected the U.S. and Israel (http://www.bbc.com/news/technology-30171614) — a deal already exists that allows the Middle Eastern allied state to access raw and "unchecked" U.S. collected intelligence (http://www.zdnet.com/nsa-provides-israel-with-raw-unchecked-us-intelligence-7000020581/).
They weren't far off. According to Monday's report, the U.S. working in conjunction with Britain, a European member state (though perhaps not for much longer (http://www.bbc.com/news/uk-politics-21148282)) attacked Belgacom using the Regin malware.
Though the Belgacom hack was disclosed by Snowden's leaks (http://www.zdnet.com/belgacom-clears-up-after-hack-attempt-7000020726/), the malware used had never been revealed.
The new details from The Intercept show how GCHQ embarked upon its "hacking mission," known as Operation Socialist, by accessing Belgacom's networks in 2010. By targeting engineers through a faked LinkedIn page (http://www.spiegel.de/international/world/ghcq-targets-engineers-with-fake-linkedin-pages-a-932821.html), GCHQ was able to get deep inside the Internet provider to steal data.
One of Belgacom's main clients was the European Commission, the European Parliament, and the European Council of member state leaders.
Exactly how member states of the European Union — there are 28 of them including the U.K. — will react to one of its own member states launching a successful hacking attack against their executive body, remains unknown.
But while members of the Parliament and Commission staff have, over the years, seen the U.S. as one of the greatest threats to the region's data protection and privacy policies (http://www.zdnet.com/blog/london/did-the-u-s-blackmail-the-eu-over-passenger-data-no-deal-no-entry/4321), they should have been looking a little closer to home.
Operation Socialist. Wow.
Those damn Belgian Socialists had to be stopped.
Good.
I guess the phrase "keep your enemies close, and your enemies closer" has some merit!
US officials and media have been reporting on malware found throughout US power generating facilities, businesses, various infrastructure facilities and whatever else. Says the malware has been there for a while and could take down the US power grid, causing so much damage that it would take months or more to fix.
Quote from: Valmy on November 25, 2014, 02:41:14 PM
Quote from: Sheilbh on November 25, 2014, 02:40:39 PM
Good.
Which part? :unsure:
We've always, always spied on the EU and our EU partners (as have the French). Or at least it's always been rumoured and other countries have always private alleged it, British ministers never talk about the intelligence services. Good to know we've kept up to date and GCHQ's involved.
Quote from: Sheilbh on November 25, 2014, 02:49:48 PM
British ministers never talk about the intelligence services.
Mitt Romney did. :lol: Ah, Mittens.
Quote from: KRonn on November 25, 2014, 02:40:58 PM
US officials and media have been reporting on malware found throughout US power generating facilities, businesses, various infrastructure facilities and whatever else. Says the malware has been there for a while and could take down the US power grid, causing so much damage that it would take months or more to fix.
Link?
Quote from: KRonn on November 25, 2014, 02:40:58 PM
I guess the phrase "keep your enemies close, and your enemies closer" has some merit!
Deliberate pun or a Freudian slip? :hmm:
Quote from: jimmy olsen on November 25, 2014, 08:07:11 PM
Quote from: KRonn on November 25, 2014, 02:40:58 PM
US officials and media have been reporting on malware found throughout US power generating facilities, businesses, various infrastructure facilities and whatever else. Says the malware has been there for a while and could take down the US power grid, causing so much damage that it would take months or more to fix.
Link?
Quote from: jimmy olsen on November 25, 2014, 08:07:11 PM
Quote from: KRonn on November 25, 2014, 02:40:58 PM
US officials and media have been reporting on malware found throughout US power generating facilities, businesses, various infrastructure facilities and whatever else. Says the malware has been there for a while and could take down the US power grid, causing so much damage that it would take months or more to fix.
Link?
http://www.dailytech.com/Two+US+Power+Plants+Infected+With+USB+Malware+Last+Year/article29682.htm
http://gizmodo.com/stuxnet-like-malware-from-russia-is-attacking-u-s-powe-1598091987