“Most sophisticated spyware” discovered by Symantec
One of the most sophisticated pieces of computer spyware ever seen has been discovered by the leading computer security company, Symantec.
The bug goes by the name Regin and has been dubbed “super-spyware”. It was probably created by a government according to Symantec, due to how sophisticated it is. They believe it would have taken years to create and that it has probably been used for about six years, since at least 2008, against a range of targets around the world. The fact that it has remained hidden for so long is an illustration of the great lengths its creators have gone to in order to keep it hidden.
It is believed that computers in the Russia and Saudi Arabia have been accessed the most, along with computers in Mexico, Ireland, India, Afghanistan, Iran, Belgium, Austria and Pakistan. Once the malicious software is installed on a computer, it can spy on computers and collect information by stealing passwords, capturing screenshots and recovering deleted files. It has been used against private individuals as well as government organisations and businesses. The malware targets users of Microsoft Windows based computers.
In seeking a comparison, Symantec has said it is similar to Stuxnet, which was a computer worm believed to have been developed by the US and Israel to target Iran’s nuclear program. That was created to damage equipment, unlike Regin which has been created to collect information, but like Stuxnet, Regin is believed to have been created by a western organisation.
Symantec confirmed that Regin was just one of thousands of samples of malicious code that they discover and process each month. The story serves as a timely reminder to people to always be vigilant online and to be extremely careful with passwords. Another recent story provided a further wake up call to members of the public, with a site streaming live feeds from people’s webcams, CCTV systems, baby monitors and other devices which connect to the internet and either had weak passwords or the owners had never changed the default password which was on the product when they purchased it. Online attacks are becoming more sophisticated and more widespread, so people always need to think about how secure their computer and other machines which connect to the internet are. For help with computer viruses, spam, and other IT-related issues, make sure to contact with our team of IT experts
IT Support
ECL recognises that every client is different, and every client has a different IT support requirement. Whatever the size of your business, we can offer a support scenario to suit your needs.
Cloud Services
Whether your business already uses Cloud services or you’re considering the Cloud as a possible way forward, talk to us first. We can provide anything from fully hosted IT infrastructures on our own ECL Private Cloud, to simple on-line backups. We can also give expert advice on Office 365 and other Cloud platforms.
Disaster Recovery
How would losing access to your IT systems and data for days, or even weeks, affect your business? For many if not most companies this would be a nightmare scenario, with potentially very serious consequences.
Office 365
Cloud services could potentially lower your overall costs and gives your employees all the tools they need alongside the correct layers of security and compliance.