By : Anupam Tiwari,CEH,CCCSP,PGDIS,
GFSU Certified, B.Tech, M.Tech
Till NOW
Reveals.
Ahead
IS
ALL ABOUT ?
ophisticated
Malware.
Telecom Operators
Research
Institutions
Individuals
involved
in
advanced
mathematical/cryptographic research
Government Institutions
Financial institutions
Main Objectives
Intelligence Gathering
The
REGIN Platform
Although till date REGIN is being referred to
The
REGIN Stages
REGIN
Platform Diagram
The
REGIN Stages
The
REGIN Stages
The
REGIN Stages
The
REGIN Stages
The
REGIN Stages
The
REGIN Stages
The
REGIN Stages
The
REGIN Stages
The
REGIN Stages
REGIN
REGIN Payloads
The log seems to contain not only the executed commands but also
usernames and passwords of some engineering accounts:
sed[snip]:Alla[snip]
hed[snip]:Bag[snip]
oss:New[snip]
administrator:Adm[snip]
REGIN Victims
Global Distribution
REGIN Victims
Global Distribution
Contact me :
anupam605@gmail.com
http://about.me/anupam.tiwari
https://www.youtube.com/user/a
nupam50/videos