{"id":114510,"date":"2014-11-24T11:05:03","date_gmt":"2014-11-24T11:05:03","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=114510"},"modified":"2014-11-24T11:05:03","modified_gmt":"2014-11-24T11:05:03","slug":"symantec-a-descoperit-un-program-spion-complex-supervizat-probabil-de-un-stat-a-provocat-brese-de-securitate-in-zece-tari","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=114510","title":{"rendered":"Symantec a descoperit un program spion complex, supervizat probabil de un stat: &#8220;A provocat bre\u015fe de securitate \u00een zece \u0163\u0103ri&#8221;"},"content":{"rendered":"<p>\nAcest malware, denumit &#8220;Regin&#8221;, este un troian extrem de sofisticat, ce permite supravegherea \u0163intelor alese \u00een cea mai mare discre\u0163ie.<\/p>\n<p>\n<strong>&#8220;Echipele Symantec au depistat bre\u015fe de securitate \u00een zece \u0163\u0103ri, \u00een primul r\u00e2nd Rusia apoi Arabia Saudit\u0103, care concentreaz\u0103 fiecare aproximativ un sfert din infect\u0103ri&#8221;, a explicat pentru AFP Candid Wueest, un cercet\u0103tor care lucreaz\u0103 pentru compania specializat\u0103 \u00een programe informatice.<\/strong><\/p>\n<p>\nCelelalte \u0163\u0103ri afectate, \u00een ordinea importan\u0163ei, sunt Mexic \u015fi Irlanda, urmate de India, Afganistan, Iran, Belgia, Austria \u015fi Pakistan.<\/p>\n<p>\nSpre deosebire de un alt malware, &#8220;Stuxnet&#8221;, care viza centrifugele de \u00eembog\u0103\u0163ire a uraniului \u00een Iran, scopul &#8220;Regin&#8221; este de a colecta diferite tipuri de date \u015fi nu de a sabota un sistem de control industrial.<\/p>\n<p>\nComplexitatea sa implic\u0103 o faz\u0103 de concep\u0163ie care a durat mai multe luni, chiar ani, \u015fi care a necesitat o investi\u0163ie financiar\u0103 important\u0103.<\/p>\n<p>\n<strong>&#8220;Timpul \u015fi resursele folosite arat\u0103 c\u0103 este responsabil un stat&#8221;, a asigurat Candid Wueest.<\/strong><\/p>\n<p>\n<strong>Dezvoltatorii au mobilizat eforturi considerabile pentru a face virusul c\u00e2t mai discret posibil, premi\u0163\u00e2ndu-i s\u0103 fie folosit \u00een misiuni de spionaj persistente de durat\u0103 foarte lung\u0103.<\/strong><\/p>\n<p>\nIdentificat pentru prima dat\u0103 anul trecut de Symantec, &#8220;Regin&#8221; a fost utilizat mai \u00eent\u00e2i \u00eentre 2008 \u015fi 2011, dat\u0103 la care a fost retras brusc. O nou\u0103 versiune a ap\u0103rut \u00een 2013, fiind \u00een continuare activ\u0103.<\/p>\n<p>\n<strong>\u0162intele includ companii, organiza\u0163ii neguvernamentale \u015fi institute de cercetare.<\/strong><\/p>\n<p>\n&#8220;Prezen\u0163a sa reperat\u0103 \u00een domenii precum cel hotelier \u015fi aeronautic, de exemplu, a putut servi instigatorilor s\u0103i pentru a se informa \u00een leg\u0103tur\u0103 cu sosirile \u015fi plec\u0103rile anumitor persoane&#8221;, afirm\u0103 expertul Symantec.<\/p>\n<p>\n<strong>&#8220;Regin&#8221; poate realiza capturi de ecran, poate prelua controlul mouse-ului \u015fi al cursorului, poate fura parole, supraveghea traficul unei re\u0163ele \u015fi recupera fi\u015fierele \u015fterse.<\/strong><\/p>\n<p>\n&#8220;Chiar dac\u0103 se ajunge la identificarea lui, este extrem de dificil de stabilit ce a f\u0103cut sau ce caut\u0103&#8221;, subliniaz\u0103 Candid Wueest.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Grupul informatic american Symantec a anun\u0163at, duminic\u0103, \u00een Fran\u0163a, c\u0103 a descoperit un malware, opera\u0163ional din 2008, a c\u0103rui complexitate tehnic\u0103 sugereaz\u0103 c\u0103 elaborarea sa a fost cel pu\u0163in supervizat\u0103 de serviciile de informa\u0163ii ale unui stat.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[510],"tags":[171,204],"class_list":["post-114510","post","type-post","status-publish","format-standard","hentry","category-actualitate","tag-internet","tag-tehnologie"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/114510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=114510"}],"version-history":[{"count":0,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/114510\/revisions"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=114510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=114510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=114510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}