<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; Kaspersky</title>
	<atom:link href="http://www.vrworld.com/tag/kaspersky/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 07:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>Regin: Stuxnet&#039;s Best Spying Malware Cousin</title>
		<link>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/</link>
		<comments>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/#comments</comments>
		<pubDate>Tue, 25 Nov 2014 00:21:36 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Backdoor.Regin]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[GSM]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Regin]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Spy]]></category>
		<category><![CDATA[Symantec]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=42133</guid>
		<description><![CDATA[<p>Regin is a new type of sophisticated malware that deeply embeds itself within a country, company or organization for the purpose of espionage.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/">Regin: Stuxnet&#039;s Best Spying Malware Cousin</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1280" height="800" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-two.png" class="attachment-post-thumbnail wp-post-image" alt="Regin Graph Kaspersky" /></p><ol>
<li class="mod">
<div class="_oDd _YXc" data-hveid="31">
<div class="_Tgc"><b>Regin</b>. /ˈreɪɡɪn/ 1. (Norse myth) a dwarf smith, tutor of Sigurd, whom he encouraged to kill Fafnir for the gold he guarded.</div>
</div>
</li>
</ol>
<p>Regin is essentially a murderous dwarf who is caught/killed by his own greed. This Norse mythology is at the core a description of the Regin virus that has injected itself across the globe and today has finally been brought to light by Symantec and Kaspersky researchers. The Regin cybvervirus is a virus that has been tracked over the course of the past few years by security firms like Symantec, Kaspersky and McAfee, but they simply did not have enough data to build the whole picture of the computer virus&#8217; scope nor its target. As a result, this research has been going on for quite some time and today multiple security companies have published their findings on the Regin malware and what it seeks to accomplish once it has infected a system.</p>
<p><img class="aligncenter size-full wp-image-42138" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Sectors.png" alt="Sectors" width="380" height="327" /></p>
<p>According to <a href="http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance" target="_blank">Symantec&#8217;s research</a>, Regin is being used as a covert espionage tool to go after very specific targets and infect them at a very deep level to either gain access to information or to gain access to a user of that network&#8217;s information. They say that Regin is a very complicated and highly encrypted piece of malware that hides its final form from anyone looking to find it unless they have access to all five stages of the malware&#8217;s unpacking. They detail the process <a href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/regin-analysis.pdf" target="_blank">in their technical whitepaper</a> but it is essentially a multi-stage virus that hides its ultimate target and execution unless users can obtain every form/stage of the virus&#8217; unpacking until it becomes the final payload.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-three.png" rel="lightbox-0"><img class="aligncenter size-full wp-image-42136" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-three.png" alt="Regin-graph-three" width="1671" height="858" /></a></p>
<p>This multi-stage approach is similar to what was seen from Duqu and Stuxnet and is once again very likely to be a sovereign-built piece of malware from some government. And as you can see, the targets that it goes after are very broad and appear to be focused mostly developing countries with Russia, Belgium and Germany being the exceptions. Those countries according to Kaspersky are:</p>
<p>Algeria<br />
Afghanistan<br />
Belgium<br />
Brazil<br />
Fiji<br />
Germany<br />
Iran<br />
India<br />
Indonesia<br />
Kiribati<br />
Malaysia<br />
Pakistan<br />
Russia<br />
Syria</p>
<p>However, if you use Symantec&#8217;s data, the list of countries actually expands to include Saudi Arabia, Austria, Ireland and Mexico.</p>
<div id="attachment_42134" style="width: 454px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/Countries.png" rel="lightbox-1"><img class="size-full wp-image-42134" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Countries.png" alt="Regin Countries" width="444" height="366" /></a><p class="wp-caption-text">Regin Countries</p></div>
<p>Additionally, <a href="http://securelist.com/blog/research/67741/regin-nation-state-ownage-of-gsm-networks/" target="_blank">Kaspersky discovered</a> a strong attack on GSM networks, especially in the case of Belgium where an entire operator was infiltrated by this malware and had publicly announced that they had been attacked, but were not aware of the perpetrator nor the target. What&#8217;s interesting, however, is that both Kaspersky and Symantec had discovered that this malware&#8217;s structure and payload delivery system (the mutli-stage approach) were specifically designed to obscure the malware&#8217;s existence and once it had infected a system it was designed to be inconspicuous as it continued to linger on the infected system, making detection incredibly difficult.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/">Regin: Stuxnet&#039;s Best Spying Malware Cousin</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Regin: Stuxnet&#039;s Best Spying Malware Cousin</title>
		<link>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/</link>
		<comments>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/#comments</comments>
		<pubDate>Tue, 25 Nov 2014 00:21:36 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Backdoor.Regin]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[GSM]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Regin]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Spy]]></category>
		<category><![CDATA[Symantec]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=42133</guid>
		<description><![CDATA[<p>Regin is a new type of sophisticated malware that deeply embeds itself within a country, company or organization for the purpose of espionage.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/">Regin: Stuxnet&#039;s Best Spying Malware Cousin</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1280" height="800" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-two.png" class="attachment-post-thumbnail wp-post-image" alt="Regin Graph Kaspersky" /></p><ol>
<li class="mod">
<div class="_oDd _YXc" data-hveid="31">
<div class="_Tgc"><b>Regin</b>. /ˈreɪɡɪn/ 1. (Norse myth) a dwarf smith, tutor of Sigurd, whom he encouraged to kill Fafnir for the gold he guarded.</div>
</div>
</li>
</ol>
<p>Regin is essentially a murderous dwarf who is caught/killed by his own greed. This Norse mythology is at the core a description of the Regin virus that has injected itself across the globe and today has finally been brought to light by Symantec and Kaspersky researchers. The Regin cybvervirus is a virus that has been tracked over the course of the past few years by security firms like Symantec, Kaspersky and McAfee, but they simply did not have enough data to build the whole picture of the computer virus&#8217; scope nor its target. As a result, this research has been going on for quite some time and today multiple security companies have published their findings on the Regin malware and what it seeks to accomplish once it has infected a system.</p>
<p><img class="aligncenter size-full wp-image-42138" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Sectors.png" alt="Sectors" width="380" height="327" /></p>
<p>According to <a href="http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance" target="_blank">Symantec&#8217;s research</a>, Regin is being used as a covert espionage tool to go after very specific targets and infect them at a very deep level to either gain access to information or to gain access to a user of that network&#8217;s information. They say that Regin is a very complicated and highly encrypted piece of malware that hides its final form from anyone looking to find it unless they have access to all five stages of the malware&#8217;s unpacking. They detail the process <a href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/regin-analysis.pdf" target="_blank">in their technical whitepaper</a> but it is essentially a multi-stage virus that hides its ultimate target and execution unless users can obtain every form/stage of the virus&#8217; unpacking until it becomes the final payload.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-three.png" rel="lightbox-0"><img class="aligncenter size-full wp-image-42136" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Regin-graph-three.png" alt="Regin-graph-three" width="1671" height="858" /></a></p>
<p>This multi-stage approach is similar to what was seen from Duqu and Stuxnet and is once again very likely to be a sovereign-built piece of malware from some government. And as you can see, the targets that it goes after are very broad and appear to be focused mostly developing countries with Russia, Belgium and Germany being the exceptions. Those countries according to Kaspersky are:</p>
<p>Algeria<br />
Afghanistan<br />
Belgium<br />
Brazil<br />
Fiji<br />
Germany<br />
Iran<br />
India<br />
Indonesia<br />
Kiribati<br />
Malaysia<br />
Pakistan<br />
Russia<br />
Syria</p>
<p>However, if you use Symantec&#8217;s data, the list of countries actually expands to include Saudi Arabia, Austria, Ireland and Mexico.</p>
<div id="attachment_42134" style="width: 454px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/11/Countries.png" rel="lightbox-1"><img class="size-full wp-image-42134" src="http://cdn.vrworld.com/wp-content/uploads/2014/11/Countries.png" alt="Regin Countries" width="444" height="366" /></a><p class="wp-caption-text">Regin Countries</p></div>
<p>Additionally, <a href="http://securelist.com/blog/research/67741/regin-nation-state-ownage-of-gsm-networks/" target="_blank">Kaspersky discovered</a> a strong attack on GSM networks, especially in the case of Belgium where an entire operator was infiltrated by this malware and had publicly announced that they had been attacked, but were not aware of the perpetrator nor the target. What&#8217;s interesting, however, is that both Kaspersky and Symantec had discovered that this malware&#8217;s structure and payload delivery system (the mutli-stage approach) were specifically designed to obscure the malware&#8217;s existence and once it had infected a system it was designed to be inconspicuous as it continued to linger on the infected system, making detection incredibly difficult.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/">Regin: Stuxnet&#039;s Best Spying Malware Cousin</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/11/24/regin-stuxnets-best-spying-malware-cousin-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>China Government Targets Symantec, Kaspersky</title>
		<link>http://www.vrworld.com/2014/08/05/china-government-targets-symantec-kaspersky/</link>
		<comments>http://www.vrworld.com/2014/08/05/china-government-targets-symantec-kaspersky/#comments</comments>
		<pubDate>Tue, 05 Aug 2014 08:34:14 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[China tensions]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Symantec]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=37162</guid>
		<description><![CDATA[<p>Anti Virus firms Symantec and Kaspersky have been removed from China’s official list of anti-virus vendors approved to sell to the government and state-owned corporations, ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/08/05/china-government-targets-symantec-kaspersky/">China Government Targets Symantec, Kaspersky</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="608" src="http://cdn.vrworld.com/wp-content/uploads/2014/08/Xi-Jinping1.jpg" class="attachment-post-thumbnail wp-post-image" alt="China&#039;s President, Xi Jinping." /></p><p>Anti Virus firms Symantec and Kaspersky have been removed from China’s official list of anti-virus vendors approved to sell to the government and state-owned corporations, continuing a trend of creating a hostile market for foreign technology companies.</p>
<p>The removal of these two companies from the list leaves only five, which, uncoincidentally, all all Chinese firms: Qihoo 360 Technology, Venustech, CAJinchen, Beijing Jiangmin, and Rising remain on the list. Last year, the list, which comes via a <a href="http://web.archive.org/web/20130916060230/http://www.zycg.cn/rjcg/show_by_category/2371">procurement bureau for government agencies</a> had many recognizable foreign brands including ESET, Panda Security and Trend Micro.</p>
<p>But while Symantec and Kaspersky are no longer allowed to sell to China government agencies, products from the two companies are not directly banned in-country.</p>
<p>&#8220;It is important to note that this list is only for certain types of procurement and Symantec products are not banned by the Chinese government,&#8221; a Symantec spokesperson said in a release.</p>
<p>Privately, China’s Public Security Ministry has alleged that Symantec has placed backdoors in its software for electronic eavesdropping &#8212; a charge that Symantec has publicly outright denied.</p>
<p>“Symantec does not put hidden functionality or back doors into any of its technologies -– not for the NSA or any other government entities,” a Symantec spokesperson is quoted in a statement first published by Bloomberg.</p>
<p>It appears that regional level governments are still allowed to purchase software made by the two companies. It’s not clear if China’s many state-owned enterprises &#8212; which include every major telecom, bank, shipbuilding, mining and construction company &#8212; are banned from procuring the software.</p>
<p>The announcement first came from the Twitter feed of the People’s Daily, a newspaper which is largely seen as a mouthpiece for the Communist party.</p>
<blockquote class="twitter-tweet" lang="en"><p>Govt procurement agency has excluded Symantec &amp; Kaspersky fm a security software supplier list, all 5 in are fm China <a href="http://t.co/cSqCxVN0jI">pic.twitter.com/cSqCxVN0jI</a></p>
<p>— People&#8217;s Daily,China (@PDChina) <a href="https://twitter.com/PDChina/statuses/495792403845238785">August 3, 2014</a></p></blockquote>
<p>Attacks against Western consumer product companies in China from state media began last year with Apple targeted for its warranty practices, but in a post-Edward Snowden world the tempo increased in 2014 and changed to <a href="http://www.reuters.com/article/2014/06/04/us-china-usa-tech-idUSKBN0EF0CA20140604">specifically target technology</a> companies.</p>
<p><script src="//platform.twitter.com/widgets.js" async="" charset="utf-8">// <![CDATA[
<</p>
<p>Attacks against Western consumer product companies in China from state media began last year with Apple targeted for its warranty practices, but in a post-Edward Snowden world the tempo increased in 2014 and changed to <a href="http://www.reuters.com/article/2014/06/04/us-china-usa-tech-idUSKBN0EF0CA20140604">specifically target technology</a> companies.
// ]]&gt;</script></p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/08/05/china-government-targets-symantec-kaspersky/">China Government Targets Symantec, Kaspersky</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/08/05/china-government-targets-symantec-kaspersky/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 22:07:41 by W3 Total Cache -->