Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile

    Regin Cyber-Spy Malware Casts Wide Net for Telecom Phone Call Data

    Written by

    Wayne Rash
    Published November 25, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Today’s malware of the moment, something called Regin, has just made the news because of an announcement by security researchers at Symantec. But it’s important to know that the only thing that’s new is Symantec’s announcement. Regin has actually been around for years, perhaps as long as a decade.

      In fact, I’d heard from senior security executives about some state-sponsored malware they were trying to get a handle on during meetings at CeBIT in 2013. At the time nobody was really sure exactly what this cyber-spy malware did, where it came from or what its intended purpose might be.

      Most of that is still true. But it turns out that the original reason why the much-discussed Regin malware may have been created was as a way to get call data from GSM phone networks. The National Security Agency has admitted to gathering such call data from voice networks and by all accounts is still gathering it.

      But what makes Regin unique is not so much what it does, but rather how it works. What Regin (short for reg–in or “in registry”) provides is a platform that can be used to load nearly anything that you’re likely to want for information gathering. Researchers have found a wide variety of intelligence-gathering functions in the malware, including key logging, network sniffing and password stealing, according to Liam Murchu, senior development manager for Symantec Security Response.

      “It’s a sophisticated platform for delivering modules onto computers,” Murchu told eWEEK. “Each victim gets different modules.” He noted that one thing that’s very unusual is that Regin has been used to attack a variety of targets including telecom companies, airlines, hotels and government agencies. But according to research by Kaspersky Lab, it was initially aimed at telephone networks.

      Regin is also unusual in the means by which it loads itself into the Windows computer that’s hosting it and in how it avoids detection. While the initial loader exists as a device driver or application on the hard disk of the target computer, the rest of the executable code exists in two places that aren’t always checked. One is in the portions of Windows Extended Attribute code that were originally written to support Microsoft’s long-abandoned collaboration with OS/2.

      The second area is in the Windows Registry on infected computers. The registry is a database on Windows computers that keeps track of the resources and configuration of installed software. The sequence appears to be that the initial loader gets the rest of its code from where it’s stored in the Extended Attributes.

      Regin Cyber-Spy Malware Cast Wide Net for Telecom Phone Call Data

      Then the code can pull in whatever additional code, configuration information of even the next step in the infection, from the registry.

      Adding to the complexity is that the initial version of the malware has apparently been withdrawn from the field, perhaps because security researchers had found it. Unfortunately for the malware writers, researchers at Kaspersky Lab and at Symantec were able to locate debris left behind when the malware was erased including a series of log files that revealed a great deal about the malware as wells as its command and control servers.

      According to researchers at Kaspersky, Regin makes use of what the company calls “Communications Drones” that are able to carry messages beyond normal packet boundaries. This means drones are able to send messages to outside services from within the network so they appear to be going one place, and actually being forwarded to another. In an example given by Kaspersky, a control message may travel between a users’ bank and their computer and it may also involve a third-party message in another location in another nation.

      In one instance observed by Kaspersky, messages moved between the president’s office in an undisclosed nation and a bank he usually deals with. But once the message is at the bank, it generates another message that goes to a control server in India. Because the second message takes place outside the president’s network, his security team would never see it.

      Fortunately, current malware detection software can find and remove Regin, at least until the next version is out. Malware scanning software that watches what comes into a machine should also be able to catch Regin, as long as it watches everything. The current version of Regin was downloaded through a number of methods, including Yahoo Messenger.

      However, there’s no reason that the initial loader can’t be embedded in an email message or any place else. This means the usual vigilance about not downloading anything is still the best advice. But even that policy may not be enough if the person trying to get this installed is particularly creative.

      Looking at the list of nations that have been infected, getting creative may have been essential. Right now most signs point to a state-sponsored player in the release of Regin, and it could be a collaboration between two or more states.

      Researchers have uncovered fragments of information in Regin code that indicate that the writers were English speakers. So the question now is whether the Regin malware came from the U.S. or Israel, or whether they were simply made to look like that.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×