Keep calm and do
not Reign on. Reign is a malware which was originally found in 2008
to 2011, disappeared, then reappeared recently. Unlike regular
malware this has extreme sophistication and complexity. Similar to
the older Flam malware Reign is deemed to by a nation-state created
spying malware. With extreme covertness it allows those who infect
to collect data from what it infect for long periods of time without
being discovered on the infected device. Other malware similar to
Flame was found around the same time and was determined to have
originated from the US and Israel backed agencies, though the
creators of Reign have not been determined it seems that it may have
similar backers.
Ever since project
PRISM was released to the public by Snowden the US has been the go to
blame for many extremely sophisticated spying programs, which would
not be surprising that the US could be behind Reign. These
sophisticated malwares have been known for a few years now but were
generally not cared about, much how PRISM had murmurs much before it
was announced to the public, but unlike PRISM was a very broad and
unsophisticated mechanism for collecting data. Reign has the ability
to target specific machines or users and collect data from those that
may be the people who a nation-state has deemed a threat (what is a
threat to a nation-state? Not a person, usually a group or another
nation-state). From early information on this malware it is known
that industries within Russia and Saudi Arabia have been heavily
targeted by Reign. It has not been specific people but
infrastructure such as ISP backbones.
Reign is newly
announced so it has not been determined how exactly it works, but
since the older Flame malware does contain similarities it could be
compared and used as a source to know how Reign works. First off,
Flame has modular, so this means that when a machine is infected it
does not contain all the hacks that the full repository of Reign
contains. This may mean that there are different versions Reign,
being modular, out in the wild affected hosts differently based on
what industry the machine is used in. The method on how Reign
spreads is currently undetermined, but Flame was spread through USB
drives, since back when it was heavily in the wild there was a USB
exploit for autorun and .lnk which would spread the malware without
permissions between machines. Flame had the ability to turn this
feature on and off so that it could control the spread of the
malware. Flame has the ability to take screen shots and send them
back to the remote servers of those who created the malware, the rate
which the screen shots were taken differed by which programs were
being used on the infected machine. This is the basics of how Reign
could be potentially working, though at a much more complex level
since it is a newer malware.
The continues the
mantra that battles will not be fought human to human but will move
towards the cat and mouse games of cyber attacks. The biggest danger
that comes from this form of war is that anyone has the potential to
be a participant, sometimes without their willingness, or a threat,
this is mainly due to the fact that all you need is the know how and
a computer to conduct these attacks. Battles of the past require
huge amounts of man power, infrastructure and money to fight, but
these new wars will be cheap, fast and deadly. At any point it is
possible that a rogue hacker with exploits of security software could
shut down the entire electrical grid of Eastern America. This would
decimate the country, imagine the nukes dropped on Japan without the
death and destruction. It could be possible to send countries back
decades in one foul swoop.
http://www.wired.com/2012/05/flame/all/
PS
Here is a new link which goes much more in depth and factual than the previous link:
https://securelist.com/blog/research/67741/regin-nation-state-ownage-of-gsm-networks/
ENJOY!
PPS
SCREW WINDOWS
PS
Here is a new link which goes much more in depth and factual than the previous link:
https://securelist.com/blog/research/67741/regin-nation-state-ownage-of-gsm-networks/
ENJOY!
PPS
SCREW WINDOWS
No comments:
Post a Comment