icon bookmark-bicon bookmarkicon cameraicon checkicon chevron downicon chevron lefticon chevron righticon chevron upicon closeicon v-compressicon downloadicon editicon v-expandicon fbicon fileicon filtericon flag ruicon full chevron downicon full chevron lefticon full chevron righticon full chevron upicon gpicon insicon mailicon moveicon-musicicon mutedicon nomutedicon okicon v-pauseicon v-playicon searchicon shareicon sign inicon sign upicon stepbackicon stepforicon swipe downicon tagicon tagsicon tgicon trashicon twicon vkicon yticon wticon fm

German govt denies Merkel staffer’s laptop infected by US/UK malware

German govt denies Merkel staffer’s laptop infected by US/UK malware
The German government has denied reports a laptop belonging to a top Merkel aide was infected with the highly-sophisticated Regin virus - malware believed to be a product of British and US spy agencies.

Earlier, Bild reported that Regin spy software was discovered on the USB stick of one of Chancellor Angela Merkel’s senior staff members. Merkel’s Head of the Department of European Policy took the stick home to polish a draft of a speech she had been writing. She saved the document on the USB device using her laptop. At work the next day, virus-scanning software revealed the flash drive was infected with Regin spy software.

READ MORE: Germany to drop investigation into US spying on Merkel – report

Additional checks turned up no infections on any of the 200 high-security laptops in the Chancellery, sources from German security services said, according to the report.

Image from symantec.com

A German government spokesperson refuted the claims on Monday afternoon.

"Such a pattern of attack has explicitly not occurred," Christiane Wirtz said in Berlin. She added that the IT systems of the Federal Chancellery were not infected. "That is, in this context, the most important statement."

Cyber-security company Symantec first warned of Regin at the end of November. A back door-type Trojan, Regin, is able to“provide its controllers with a powerful framework for mass surveillance.”

READ MORE: Sophisticated ‘state-sponsored’ spying tool targeted govts, infrastructure for years

According to Bild’s report, the virus demonstrates such a“rare degree of technical competence”that indicates it has probably been developed by a nation state – and it could have taken years. Regin is able to fulfill a range of customizable tasks, such as making screenshots, controlling the mouse cursor and stealing passwords, depending on the target of a spying operation.

Media reports associated Regin with the US National Security Agency (NSA) and its British counterpart Government Communications Headquarters (GCHQ). The virus is believed to begin operating in 2008, targeting governments, infrastructure operators, researchers, as well as private individuals and businesses.

Dear readers and commenters,

We have implemented a new engine for our comment section. We hope the transition goes smoothly for all of you. Unfortunately, the comments made before the change have been lost due to a technical problem. We are working on restoring them, and hoping to see you fill up the comment section with new ones. You should still be able to log in to comment using your social-media profiles, but if you signed up under an RT profile before, you are invited to create a new profile with the new commenting system.

Sorry for the inconvenience, and looking forward to your future comments,

RT Team.