{"id":4984,"date":"2015-01-28T15:13:55","date_gmt":"2015-01-28T20:13:55","guid":{"rendered":"http:\/\/olduvai.ca\/?p=4984"},"modified":"2015-01-28T15:13:55","modified_gmt":"2015-01-28T20:13:55","slug":"source-code-similarities-experts-unmask-regin-trojan-as-nsa-tool","status":"publish","type":"post","link":"https:\/\/olduvai.ca\/?p=4984","title":{"rendered":"Source Code Similarities: Experts Unmask &#8216;Regin&#8217; Trojan as NSA Tool"},"content":{"rendered":"<h3 class=\"article-title\"><a href=\"http:\/\/www.spiegel.de\/international\/world\/regin-malware-unmasked-as-nsa-tool-after-spiegel-publishes-source-code-a-1015255.html\" target=\"_blank\"><span class=\"headline-intro\">Source Code Similarities:<\/span>\u00a0<span class=\"headline\">Experts Unmask &#8216;Regin&#8217; Trojan as NSA Tool<\/span><\/a><\/h3>\n<p><span class=\"Apple-style-span\">Earlier this month, SPIEGEL International published an article based on the trove of documents made available by whistleblower Edward Snowden describing the\u00a0<a class=\"text-link-int\" title=\"increasingly complex digital weapons\" href=\"http:\/\/www.spiegel.de\/international\/world\/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html\">increasingly complex digital weapons<\/a>\u00a0being developed by intelligence services in the US and elsewhere. Concurrently, several documents were published as well as\u00a0<a class=\"spTextlinkExt text-link-ext\" title=\"QWERTY: NSA-Quellcode\" href=\"http:\/\/www.spiegel.de\/media\/media-35668.pdf\" target=\"_self\">the source code<\/a>\u00a0of a sample malware program called QWERTY found in the Snowden archive.<\/span><\/p>\n<p><span class=\"Apple-style-span\">For most readers, that source code was little more than 11 pages of impenetrable columns of seemingly random characters. But experts with the Russian IT security company Kaspersky compared the code with malware programs they have on file. What they found were clear similarities with an elaborate cyber-weapon that has been making international headlines since November of last year.<\/span><\/p>\n<p>Last fall, Kaspersky and the US security company Symantec both reported for the first time the discovery of a cyber-weapon system which they christened &#8220;Regin&#8221;. According to Kaspersky, the malware had already been in circulation for 10 years and had been deployed against targets in at least 14 countries, including Germany, Belgium and Brazil but also India and Indonesia.<\/p>\n<p>Symantec spoke of a &#8220;highly complex&#8221; threat. Many of the targets were in the telecommunications sector, but others included energy companies and airlines. Both Symantec and Kaspersky did not shy away from superlatives when describing the malware program, calling it a &#8220;top-tier espionage tool&#8221; and the most dangerous cyber-weapon since Stuxnet, the notorious malware program used to attack the Iranian nuclear program.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8230;click on the above link to read the rest of the article&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Source Code Similarities:\u00a0Experts Unmask &#8216;Regin&#8217; Trojan as NSA Tool Earlier this month, SPIEGEL International published an article based on the trove of documents made available by whistleblower Edward Snowden describing the\u00a0increasingly complex digital weapons\u00a0being developed by intelligence services in the US and elsewhere. Concurrently, several documents were published as well as\u00a0the source code\u00a0of a sample [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[6],"tags":[1543,249,577,3010,3006,1402,3009,3007,3008],"class_list":["post-4984","post","type-post","status-publish","format-standard","hentry","category-liberty","tag-digital-surveillance","tag-edward-snowden","tag-nsa","tag-nsa-surveillance","tag-qwerty","tag-regin","tag-regin-trojan","tag-snowden","tag-source-code"],"_links":{"self":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/4984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4984"}],"version-history":[{"count":1,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/4984\/revisions"}],"predecessor-version":[{"id":4985,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/4984\/revisions\/4985"}],"wp:attachment":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}