This extract of source code, presented here with a short introduction, appears to be part of the WARRIORPRIDE suite and was subsequently linked to the nation-state level malware Regin: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Originally published by the Intercept, 13 December 2014
This weekend, the Intercept published further corroborating evidence linking the advanced malware known as Regin to GCHQ’s Operation Socialist attack on Begium’s biggest telecommunications company, Belgacom.
This undated extract from a GCHQ document cites the codename HOPSCOTCH, also found in an analysis of Regin malware: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
24 November 2014 – Over the past 24 hours, security companies have released information about an advanced malware tool called Regin.
Symantec described Regin as “a complex piece of malware whose structure displays a degree of technical competence rarely seen”, concluding that the “capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state.”