Aliases: Trojan.Win32.Regin.a (Kaspersky) Backdoor.Regin (Ikarus) W32/Regin.B.gen!Eldorado (Command) TR/Agent.34304.20 (Avira) W32/Regin.B!tr (Fortinet) Regin!sys (McAfee) TROJ_REGIN.A (Trend Micro)
Microsoft security software detects and removes this family of threats.
These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.
Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.
Use the following free Microsoft software to detect and remove this threat:
You should also run a full scan. A full scan might find hidden malware.
Get more help
If you’re using Windows XP, see our Windows XP end of support page.