![]() Kaspersky Lab previously summed up Regin as “a cyber-attack platform which the attackers deploy in the victim networks for ultimate remote control at all possible levels.” They believe the malware has been around for about 10 years and 27 different victims had been targeted by Regin. ![]() It was sophisticated like Stuxnet and Duqu it was “highly suited for persistent, long term surveillance operations against targets.” Although the researchers had seen Regin used in less than 100 attacks ( pdf), it provided “its controllers with a powerful framework for mass surveillance and has been used in spying operations against government organizations, infrastructure operators, businesses, researchers, and private individuals.”į-Secure researchers said they believed Regin was “in the same category of highly sophisticated espionage campaigns" like "Stuxnet, Flame, and Turla/Snake,” but that the malware didn’t come out of Russia or China. In case you don’t know about Regin, in November, Symantec called the advanced malware a “top-tier espionage tool” for secret surveillance.
0 Comments
Leave a Reply. |