{"id":51115,"date":"2014-12-15T12:00:32","date_gmt":"2014-12-15T12:00:32","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=51115"},"modified":"2015-05-05T21:27:11","modified_gmt":"2015-05-05T20:27:11","slug":"operation-socialist","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/12\/operation-socialist\/","title":{"rendered":"Operation Socialist: The Inside Story of How British Spies Hacked Belgium\u2019s Largest Telco"},"content":{"rendered":"<div id=\"attachment_51116\" style=\"width: 734px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/belgacom-hq1-feature-hero-b.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51116\" class=\"wp-image-51116\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/belgacom-hq1-feature-hero-b-1024x680.jpg\" alt=\"Belgacom headquarters: Paul O\u2019Driscoll\/Getty\" width=\"724\" height=\"481\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/belgacom-hq1-feature-hero-b-1024x680.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/belgacom-hq1-feature-hero-b-300x199.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/belgacom-hq1-feature-hero-b.jpg 1200w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><p id=\"caption-attachment-51116\" class=\"wp-caption-text\">Belgacom headquarters: Paul O\u2019Driscoll\/Getty<\/p><\/div>\n<p>When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies.<\/p>\n<p>It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium\u2019s largest telecommunications provider, Belgacom. But it wasn\u2019t until a year later, in June 2013, that the company\u2019s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data.<\/p>\n<p>Last year, documents from National Security Agency whistleblower Edward Snowden <a target=\"_blank\" href=\"http:\/\/www.spiegel.de\/international\/europe\/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html\" >confirmed<\/a> that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, <em>The Intercept <\/em><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/11\/24\/secret-regin-malware-belgacom-nsa-gchq\/\" >revealed<\/a> that the malware found on Belgacom\u2019s systems was one of the most advanced spy tools ever identified by security researchers, who named it \u201cRegin.\u201d<\/p>\n<p>The full story about GCHQ\u2019s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery\u2014and the scope of the attack unclear.<\/p>\n<p>Now, in partnership with Dutch and Belgian newspapers <a target=\"_blank\" href=\"http:\/\/www.nrc.nl\/nieuws\/2014\/12\/13\/verantwoording-en-documenten\/\" ><em>NRC Handelsblad<\/em><\/a> and <a target=\"_blank\" href=\"http:\/\/www.standaard.be\/cnt\/dmf20141212_01426880\" ><em>De Standaard<\/em><\/a>, <em>The Intercept<\/em> has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation.<\/p>\n<p>Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom\u2019s networks, <em>The Intercept <\/em>and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom\u2019s systems, eventually compromising the very core of the company\u2019s networks.<\/p>\n<p>Snowden told <em>The Intercept<\/em> that the latest revelations amounted to unprecedented \u201csmoking-gun attribution for a governmental cyber attack against critical infrastructure.\u201d<\/p>\n<p>The Belgacom hack, he said, is the \u201cfirst documented example to show one EU member state mounting a cyber attack on another\u2026a breathtaking example of the scale of the state-sponsored hacking problem.\u201d<\/p>\n<p>Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers\u2019 data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom\u2019s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company.<\/p>\n<p>Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, <em>The Intercept <\/em>has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled\u2014and they believe parts of the GCHQ malware were never fully removed.<\/p>\n<p>The revelations about the scope of the hacking operation will likely alarm Belgacom\u2019s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company.<\/p>\n<p>Sophia in \u2018t Veld, a Dutch politician who chaired the European Parliament\u2019s <a target=\"_blank\" href=\"http:\/\/www.europarl.europa.eu\/news\/en\/news-room\/content\/20140310BKG38512\/html\/QA-on-Parliament%27s-inquiry-into-mass-surveillance-of-EU-citizens\" >recent inquiry<\/a> into mass surveillance exposed by Snowden, told <em>The Intercept<\/em> that she believes the British government should face sanctions if the latest disclosures are proven.<\/p>\n<p>\u201cCompensating Belgacom should be the very least it should do,\u201d int\u2019 Veld said. \u201cBut I am more concerned about accountability for breaking the law, violating fundamental rights, and eroding our democratic systems.\u201d<\/p>\n<p>Other similarly sophisticated state-sponsored malware attacks believed to have been perpetrated by Western countries have involved Stuxnet, a bug used to sabotage Iranian nuclear systems, and Flame, a spy malware that was found collecting data from systems predominantly in the Middle East.<\/p>\n<p>What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally\u2014and is backed up by a series of top-secret documents, which <em>The Intercept<\/em> is <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/documents\/\" >now publishing<\/a>.<\/p>\n<p>GCHQ declined to comment for this story, and insisted that its actions are \u201cnecessary legal, and proportionate.\u201d<\/p>\n<p><strong>The beginning<\/strong><\/p>\n<p>The origins of the attack on Belgacom can be traced back to 2009, when GCHQ began <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-automated-noc-detection-2011\/\" >developing new techniques<\/a> to hack into telecommunications networks. The methods were discussed and developed during a series of top-secret \u201csignals development\u201d conferences, held annually by countries in the so-called \u201cFive Eyes\u201d surveillance alliance: the United States, the United Kingdom, Australia, New Zealand, and Canada.<\/p>\n<p>Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption\u2014what it described as the \u201c<a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-making-network-sense-encryption-problem-2011\/\" >encryption problem<\/a>.\u201d<\/p>\n<p>When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic <em>before <\/em>it\u2019s encrypted.<\/p>\n<p>The British spies identified Belgacom as a top target to be infiltrated. The company, along with its subsidiary Belgacom International Carrier Services, plays an important role in Europe, and has partnerships with hundreds of telecommunications companies across the world\u2014in Africa, Asia, Europe, the Middle East, and the United States. The Belgacom subsidiary maintains one of the world\u2019s largest \u201croaming\u201d hubs, which means that when foreign visitors traveling through Europe on vacation or a business trip use their cellphones, many of them connect to Belgacom\u2019s international carrier networks.<\/p>\n<p>The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom\u2019s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named \u201c<a target=\"_blank\" href=\"https:\/\/prod01-cdn01.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/12\/Belgacom_Connections.jpg\" >Belgacom_connections<\/a>,\u201d highlights the company\u2019s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.<\/p>\n<p><strong>Attack planning<\/strong><\/p>\n<p>Before GCHQ launched its attack on Belgacom\u2019s systems, the spy agency conducted in-depth reconnaissance, using its powerful surveillance systems to covertly map out the company\u2019s network and identify key employees \u201c<a target=\"_blank\" href=\"https:\/\/prod01-cdn01.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/12\/security.png\" >in areas related to maintenance and security<\/a>.\u201d<\/p>\n<p>GCHQ <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-automated-noc-detection-2011\/\" >documents show<\/a> that it maintains special databases for this purpose, storing details about computers used by engineers and system administrators who work in the nerve center, or \u201cnetwork operations center,\u201d of computer networks worldwide. Engineers and system administrators are particularly interesting to the spies because they manage networks\u2014and hold the keys that can be used to unlock large troves of private data.<\/p>\n<p>GCHQ developed a system called NOCTURNAL SURGE to search for particular engineers and system administrators by finding their IP addresses, unique identifiers that are allocated to computers when they connect to the internet. In early 2011, the <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-automated-noc-detection-2011\/\" >documents show<\/a>, GCHQ refined the NOCTURNAL SURGE system with the help of its Canadian counterparts, who had developed a similar tool, named PENTAHO.<\/p>\n<p>GCHQ narrowed down IP addresses it believed were linked to the Belgacom engineers by using data its surveillance systems had collected about internet activity, before moving into what would be the final stages prior to launching its attack. The documents show that the agency used a tool named HACIENDA to scan for vulnerable potential access points in the Belgacom\u2019s networks; it then went hunting for particular engineers or administrators that it could infect with malware.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/nocturnal-540x405-belgacom-hacking-cghq.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-51117\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/nocturnal-540x405-belgacom-hacking-cghq.png\" alt=\"nocturnal-540x405 belgacom hacking cghq\" width=\"540\" height=\"405\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/nocturnal-540x405-belgacom-hacking-cghq.png 540w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/nocturnal-540x405-belgacom-hacking-cghq-300x225.png 300w\" sizes=\"auto, (max-width: 540px) 100vw, 540px\" \/><\/a><\/p>\n<p><strong>The infection<\/strong><\/p>\n<p>The British spies, part of special unit named the Network Analysis Center, began trawling through their vast repositories of intercepted Internet data for more details about the individuals they had identified as suspected Belgacom engineers.<\/p>\n<p>The spies used the IP addresses they had associated with the engineers as search terms to sift through their surveillance troves, and were quickly able to find what they needed to confirm the employees\u2019 identities and target them individually with malware.<\/p>\n<p>The confirmation <a target=\"_blank\" href=\"https:\/\/prod01-cdn02.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/12\/cookies-qi.png\" >came in the form<\/a> of Google, Yahoo, and LinkedIn \u201ccookies,\u201d tiny unique files that are automatically placed on computers to identify and sometimes track people browsing the Internet, often for advertising purposes. GCHQ maintains a huge repository named MUTANT BROTH that stores billions of these intercepted cookies, which it uses to correlate with IP addresses to determine the identity of a person. GCHQ refers to cookies internally as \u201ctarget detection identifiers.\u201d<\/p>\n<p>Top-secret GCHQ documents name three male Belgacom engineers who were identified as targets to attack. <em>The Intercept<\/em> has confirmed the identities of the men, and contacted each of them prior to the publication of this story; all three declined comment and requested that their identities not be disclosed.<\/p>\n<p>GCHQ monitored the browsing habits of the engineers, and geared up to enter the most important and sensitive phase of the secret operation. The agency planned to perform a so-called \u201c<a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/03\/12\/quantum-insert-diagrams\/\" >Quantum Insert<\/a>\u201d attack, which involves redirecting people targeted for surveillance to a malicious website that infects their computers with malware at a lightning pace. In this case, the documents indicate that GCHQ set up a malicious page that looked like LinkedIn to trick the Belgacom engineers. (The NSA also uses Quantum Inserts to target people, as <em>The Intercept<\/em> has <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/03\/12\/nsa-plans-infect-millions-computers-malware\/\" >previously reported<\/a>.)<\/p>\n<p>A GCHQ <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1379049-gchq-nac-business-review-january-march-2011.html\" >document<\/a> reviewing operations conducted between January and March 2011 noted that the hack on Belgacom was successful, and stated that the agency had obtained access to the company\u2019s systems as planned. By installing the malware on the engineers\u2019 computers, the spies had gained control of their machines, and were able to exploit the broad access the engineers had into the networks for surveillance purposes.<\/p>\n<p>The document stated that the hacking attack against Belgacom had penetrated \u201cboth deep into the network and at the edge of the network,\u201d adding that ongoing work would help \u201cfurther this new access.\u201d<\/p>\n<p>By December 2011, as part of <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1379048-gchq-nac-review-october-december-2011.html\" >a second \u201csurge\u201d against Belgacom<\/a>, GCHQ identified other cellphone operators connecting to company\u2019s network as part of international roaming partnerships, and successfully hacked into data links carrying information over a protocol known as GPRS, which handles cellphone internet browsing sessions and multimedia messages.<\/p>\n<p>The spy agency was able to obtain data that was being sent between Belgacom and other operators through encrypted tunnels known as \u201cvirtual private networks.\u201d GCHQ boasted that its work to conduct \u201cexploitation\u201d against these private networks had been highly productive, <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1379048-gchq-nac-review-october-december-2011.html\" >noting<\/a> \u201cthe huge extent of opportunity that this work has identified.\u201d Another <a target=\"_blank\" href=\"https:\/\/prod01-cdn00.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/12\/3-2011-12-NAC-3Q-review-october-december-2011.png\" >document<\/a>, dated from late 2011, added: \u201cNetwork Analysis on BELGACOM hugely successful enabling exploitation.\u201d<\/p>\n<p>GCHQ had accomplished its objective. The agency had severely compromised Belgacom\u2019s systems and could intercept encrypted and unencrypted private data passing through its networks. The hack would remain undetected for two years, until the spring of 2013.<\/p>\n<div id=\"attachment_51118\" style=\"width: 710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/belgacom-hq1-feature-hero-b2.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51118\" class=\"wp-image-51118\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/belgacom-hq1-feature-hero-b2.jpg\" alt=\"Inside the Belgacom network control center in Brussels.\" width=\"700\" height=\"388\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/belgacom-hq1-feature-hero-b2.jpg 1000w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/belgacom-hq1-feature-hero-b2-300x166.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><p id=\"caption-attachment-51118\" class=\"wp-caption-text\">Inside the Belgacom network control center in Brussels.<\/p><\/div>\n<p><strong>The discovery<\/strong><\/p>\n<p>In the summer 2012, system administrators detected errors within Belgacom\u2019s systems. At the company\u2019s offices on Lebeau Street in Brussels, a short walk from the European Parliament\u2019s Belgian offices, employees of Belgacom\u2019s BICS subsidiary complained about problems receiving emails. The email server had malfunctioned, but Belgacom\u2019s technical team couldn\u2019t work out why.<\/p>\n<p>The glitch was left unresolved until June 2013, when there was a sudden flare-up. After a Windows software update was sent to Belgacom\u2019s email exchange server, the problems returned, worse than before. The administrators contacted Microsoft for help, questioning whether the new Windows update could be the reason for the fault. But Microsoft, too, struggled to identify exactly what was going wrong. There was still no solution to be found. (Microsoft declined to comment for this story.)<\/p>\n<p>Belgacom\u2019s internal security team began to suspect that the systems had been infected with some sort of virus, and the company decided it was time to call in outside experts. It hired Dutch computer security firm <a target=\"_blank\" href=\"https:\/\/www.fox-it.com\/en\/\" >Fox-IT<\/a> to come and scan the systems for anything suspicious.<\/p>\n<p>Before long, Fox-IT discovered strange files on Belgacom\u2019s email server that appeared to be disguised as legitimate Microsoft software. The suspicious files had been enabling a highly sophisticated hacker to circumvent automatic Microsoft software updates of Belgacom\u2019s systems in order to continue infiltrating the company\u2019s systems.<\/p>\n<p>About a month after Belgacom had identified the malicious software, or malware, it informed Belgian police and the country\u2019s specialist federal computer crime unit, according to sources familiar with the incident. Belgian military intelligence was also called in to investigate the hack, together with Fox-IT.<\/p>\n<p>The experts from Fox IT and military intelligence worked to dissect the malware on Belgacom\u2019s systems, and were shocked by what they found. In interviews with <em>The Intercept <\/em>and its reporting partners, sources familiar with the investigation described the malware as the most advanced they had ever seen, and said that if the email exchange server had not malfunctioned in the first place, the spy bug would likely have remained inside Belgacom for several more years.<\/p>\n<p><strong>A deep breach<\/strong><\/p>\n<p>While working to assess the extent of the infection at Belgacom, the team of investigators realized that the damage was far more extensive than they first thought. The malware had not only compromised Belgacom\u2019s email servers, it had infected more than 120 computer systems operated by the company, including up to 70 personal computers.<\/p>\n<p>The most serious discovery was that the large routers that form the very core of Belgacom\u2019s international carrier networks, made by the American company Cisco, were also found to have been compromised and infected. The routers are one of the most closely guarded parts of the company\u2019s infrastructure, because they handle large flows of sensitive private communications transiting through its networks.<\/p>\n<p>Earlier Snowden leaks <a target=\"_blank\" href=\"http:\/\/www.spiegel.de\/international\/world\/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html\" >have shown<\/a> how the NSA can compromise routers, such as those operated by Cisco; the agency can remotely hack them, or <a target=\"_blank\" href=\"http:\/\/arstechnica.com\/tech-policy\/2014\/05\/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant\/\" >physically intercept<\/a> and bug them before they are installed at a company. In the Belgacom case, it is not clear exactly which method was used by GCHQ\u2014or whether there was any direct NSA assistance. (The NSA declined to comment for this story.)<\/p>\n<p>Either way, the malware investigators at Belgacom never got a chance to study the routers. After the infection of the Cisco routers was found, the company issued an order that no one could tamper with them. Belgacom bosses insisted that only employees from Cisco could handle the routers, which caused unease among some of the investigators.<\/p>\n<p>\u201cYou could ask many security companies to investigate those routers,\u201d one of the investigators told <em>The Intercept<\/em>. By bringing in Cisco employees to do the investigation, \u201cyou can\u2019t perform an independent inspection,\u201d said the source, who spoke on condition of anonymity because he was not authorized to speak to the media<\/p>\n<p>A spokesman for Cisco declined to comment on the Belgacom investigation, citing company policy. \u201cCisco does not comment publicly on customer relationships or specific customer incidents,\u201d the spokesman said.<\/p>\n<p>Shortly after the malware was found on the routers, Fox-IT was told by Belgacom to stop its investigation. Researchers from the Dutch security company were asked to write-up a report about their findings as soon as possible. Under the conditions of a non-disclosure agreement, they could not speak about what they had found, nor could they publicly warn against the malware. Moreover, they were not allowed to remove the malware.<\/p>\n<p>Between late August and mid-September 2013, there was an intense period of activity surrounding Belgacom.<\/p>\n<p>On August 30, some parts of the malware were remotely deleted from the company\u2019s infected systems\u2014apparently after the British spies realized that it had been detected. But the malware was not completely removed, according to sources familiar with the investigation.<\/p>\n<p>Two weeks later, on September 14, employees from Belgacom, investigators, police and military intelligence services began an intensive attempt to completely purge the spy bug from the systems.<\/p>\n<p>During this operation, journalists were tipped off for the first time about the malware investigation. <em>The Intercept<\/em>\u2019s Dutch and Belgian partners <em><a target=\"_blank\" href=\"http:\/\/www.nrc.nl\/nieuws\/2013\/09\/16\/netwerk-belgacom-afgeluisterd-door-britse-of-amerikaanse-inlichtingendiensten\/\" >NRC Handelsblad<\/a><\/em> and <em><a target=\"_blank\" href=\"http:\/\/www.standaard.be\/cnt\/dmf20130915_00743270\" >De Standaard<\/a><\/em> reported the news, disclosing that sources familiar with the investigation suspected NSA or GCHQ may have been responsible for the attack.<\/p>\n<p>The same day the story broke, on Sept. 16, Belgacom issued a <a target=\"_blank\" href=\"http:\/\/www.belgacom.com\/be-en\/newsdetail\/ND_20130916_Belgacom.page\" >press release<\/a>. \u201cAt this stage there is no indication of any impact on the customers or their data,\u201d it said. \u201cAt no point in time has the delivery of our telecommunication services been compromised.\u00a0\u201c<\/p>\n<p>Then, on September 20, German news magazine <em>Der Spiegel<\/em> <a target=\"_blank\" href=\"http:\/\/www.spiegel.de\/international\/europe\/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html\" >published documents<\/a> from Snowden revealing that British spies were behind the hack, providing the first confirmation of the attacker\u2019s identity.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/op-socialist-540x362-belgacom.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-51119\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/op-socialist-540x362-belgacom.png\" alt=\"op-socialist-540x362 belgacom\" width=\"540\" height=\"362\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/op-socialist-540x362-belgacom.png 540w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/12\/op-socialist-540x362-belgacom-300x201.png 300w\" sizes=\"auto, (max-width: 540px) 100vw, 540px\" \/><\/a><\/p>\n<p><strong>Significant resources<\/strong><\/p>\n<p>In the aftermath of the revelations, Belgacom refused to comment on GCHQ\u2019s role as the architect of the intrusion. Top officials from the company were <a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=ayR6CAuNE4w\" >called to appear<\/a> before a European Parliamentary committee investigating the extent of mass surveillance revealed by Snowden.<\/p>\n<p>The Belgacom bosses told the committee that there were no problems with Belgacom\u2019s systems after a \u201cmeticulous\u201d clean-up operation, and again claimed that private communications were not compromised. They dismissed media reports about the attack, and declined to discuss anything about the perpetrator, saying only that \u201cthe hackers [responsible] have considerable resources behind them.\u201d<\/p>\n<p>People with knowledge of the malware investigation watched Belgacom\u2019s public statements with interest. And some of them have questioned the company\u2019s version of events.<\/p>\n<p>\u201cThere was only a partial clean-up,\u201d said one source familiar with the malware investigation. \u201cI believe it is still there. It is very hard to remove and, from what I\u2019ve seen, Belgacom never did a serious attempt to remove it.\u201d<\/p>\n<p>Belgacom declined to comment for this story, citing the ongoing criminal investigation in Belgium.<\/p>\n<p>Last month, <em>The Intercept<\/em> <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/11\/24\/secret-regin-malware-belgacom-nsa-gchq\/\" >confirmed<\/a> Regin as the malware found on Belgacom\u2019s systems during the clean-up operation.<\/p>\n<p>The spy bug was described by security researchers as one of the most sophisticated pieces of malware ever discovered, and was <a target=\"_blank\" href=\"http:\/\/securelist.com\/blog\/research\/67741\/regin-nation-state-ownage-of-gsm-networks\/\" >found<\/a> to have been targeting a host of telecommunications networks, governments, and research organizations, in countries such as Germany, Iran, Brazil, Russia, and Syria, as well as Belgium.<\/p>\n<p>GCHQ has refused to comment on Regin, as has the NSA, and Belgacom. But Snowden documents contain strong evidence, which has not been reported before, that directly links British spies to the malware.<\/p>\n<p>Aside from showing extensive details about how the British spies infiltrated the company and planted malware to successfully steal data, GCHQ documents in the Snowden archive contain codenames that also <a target=\"_blank\" href=\"http:\/\/securelist.com\/blog\/research\/67741\/regin-nation-state-ownage-of-gsm-networks\/\" >appear in samples<\/a> of the Regin malware found on Belgacom\u2019s systems, such as \u201cLegspin\u201d and \u201cHopscotch.\u201d<\/p>\n<p>One GCHQ document about the use of hacking methods references the use of \u201c<a target=\"_blank\" href=\"https:\/\/prod01-cdn03.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/12\/legspin.png\" >Legspin<\/a>\u201d to exploit computers. Another document describes \u201c<a target=\"_blank\" href=\"https:\/\/prod01-cdn03.cdn.firstlook.org\/wp-uploads\/sites\/1\/2014\/12\/hopscotch.png\" >Hopscotch<\/a>\u201d as part of a system GCHQ uses to analyze data collected through surveillance.<\/p>\n<p>Ronald Prins, director of the computer security company Fox-IT, has studied the malware, and played a key role in the analysis of Belgacom\u2019s infected networks.<\/p>\n<p>\u201cDocuments from Snowden and what I\u2019ve seen from the malware can only lead to one conclusion,\u201d Prins told <em>The Intercept<\/em>. \u201cThis was used by GCHQ.\u201d<\/p>\n<p>\u2014\u2014\u2014<\/p>\n<p><em>Documents published with this article:<\/em><\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-automated-noc-detection-2011\/\" >Automated NOC detection<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-mobile-networks-noc-world\/\" >Mobile Networks in My NOC World<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-making-network-sense-encryption-problem-2011\/\" >Making network sense of the encryption problem<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-stargate-cne-requirements\/\" >Stargate CNE requirements<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-nac-review-october-december-2011\/\" >NAC review \u2013 October to December 2011<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-nac-business-review-january-march-2011\/\" >GCHQ NAC review \u2013 January to March 2011<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-nac-review-april-june-2011\/\" >GCHQ NAC review \u2013 April to June 2011<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-nac-review-july-september-2011\/\" >GCHQ NAC review \u2013 July to September 2011<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-nac-review-january-march-2012\/\" >GCHQ NAC review \u2013 January to March 2012<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/hopscotch\/\" >GCHQ Hopscotch<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/12\/13\/gchq-belgacom-connections\/\" >Belgacom connections<\/a><\/li>\n<\/ul>\n<p>______________________________<\/p>\n<p><em>Map: Ingrid Burrington and Josh Begley; Belgacom operations center,\u00a0Paul O\u2019Driscoll\/Bloomberg via Getty.<\/em><\/p>\n<p><em>Email the author: <a href=\"mailto:ryan.gallagher@theintercept.com\">ryan.gallagher@theintercept.com<\/a><\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/12\/13\/belgacom-hack-gchq-inside-story\/\" >Go to Original \u2013 firstlook.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-51115","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/51115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=51115"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/51115\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=51115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=51115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=51115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}