When the incoming emails stopped arriving, it seemed innocuous at 
first. But it would eventually become clear that this was no routine 
technical problem. Inside a row of gray office buildings in Brussels, a 
major hacking attack was in progress. And the perpetrators were British 
government spies.
It was in the summer of 2012 that the anomalies were initially 
detected by employees at Belgium’s largest telecommunications provider, 
Belgacom. But it wasn’t until a year later, in June 2013, that the 
company’s security experts were able to figure out what was going on. 
The computer systems of Belgacom had been infected with a highly 
sophisticated malware, and it was disguising itself as legitimate 
Microsoft software while quietly stealing data.
Last year, documents from National Security Agency whistleblower Edward Snowden confirmed
 that British surveillance agency Government Communications Headquarters
 was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed
 that the malware found on Belgacom’s systems was one of the most 
advanced spy tools ever identified by security researchers, who named it
 “Regin.”
The full story about GCHQ’s infiltration of Belgacom, however, has 
never been told. Key details about the attack have remained shrouded in 
mystery—and the scope of the attack unclear.
Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept
 has pieced together the first full reconstruction of events that took 
place before, during, and after the secret GCHQ hacking operation.
Based on new documents from the Snowden archive and interviews with 
sources familiar with the malware investigation at Belgacom, The Intercept and
 its partners have established that the attack on Belgacom was more 
aggressive and far-reaching than previously thought. It occurred in 
stages between 2010 and 2011, each time penetrating deeper into 
Belgacom’s systems, eventually compromising the very core of the 
company’s networks.
Snowden told The Intercept that the latest revelations 
amounted to unprecedented “smoking-gun attribution for a governmental 
cyber attack against critical infrastructure.”
The Belgacom hack, he said, is the “first documented example to show 
one EU member state mounting a cyber attack on another…a breathtaking 
example of the scale of the state-sponsored hacking problem.”
Publicly, Belgacom has played down the extent of the compromise, 
insisting that only its internal systems were breached and that 
customers’ data was never found to have been at risk. But secret GCHQ 
documents show the agency gained access far beyond Belgacom’s internal 
employee computers and was able to grab encrypted and unencrypted 
streams of private communications handled by the company.
Belgacom invested several million dollars in its efforts to clean-up 
its systems and beef-up its security after the attack. However, The Intercept has
 learned that sources familiar with the malware investigation at the 
company are uncomfortable with how the clean-up operation was 
handled—and they believe parts of the GCHQ malware were never fully 
removed.
The revelations about the scope of the hacking operation will likely 
alarm Belgacom’s customers across the world. The company operates a 
large number of data links internationally (see interactive map below), 
and it serves millions of people across Europe as well as officials from
 top institutions including the European Commission, the European 
Parliament, and the European Council. The new details will also be 
closely scrutinized by a federal prosecutor in Belgium, who is currently
 carrying out a criminal investigation into the attack on the company.
Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
“Compensating Belgacom should be the very least it should do,” in ’t 
Veld said. “But I am more concerned about accountability for breaking 
the law, violating fundamental rights, and eroding our democratic 
systems.”
Other similarly sophisticated state-sponsored malware attacks 
believed to have been perpetrated by Western countries have involved 
Stuxnet, a bug used to sabotage Iranian nuclear systems, and Flame, a 
spy malware that was found collecting data from systems predominantly in
 the Middle East.
What sets the secret British infiltration of Belgacom apart is that 
it was perpetrated against a close ally—and is backed up by a series of 
top-secret documents, which The Intercept is now publishing.
GCHQ declined to comment for this story, and insisted that its actions are “necessary legal, and proportionate.”
 
 
 
 Posts
Posts
 
