Join Our Community!Join Our WhiteHat Group On facebook & Stay Updated.

Russian Hackers Stole NSA secrets with help of Kaspersky

Russian Hackers Stole NSA Data on U.S. Cyber Defense –

KasperSky Helped Hackers to steal secrets
KasperSky Helped Hackers to steal secrets

The Wall Street Journal simply distributed a flammable article that says hackers working for the Russian government stole secret material from a National Security Agency temporary worker’s home PC. The hackers did as such, as indicated by the WSJ, in the wake of recognizing records however the temporary worker’s utilization of antivirus software from Moscow-based Kaspersky Lab.


The report may well be valid, be that as it may, for the present, there’s no real way to autonomously affirm it. The report depends on anonymous individuals the distribution says knew about the issue, and it gives no confirmation to help its claim. Also, the absence of detail leaves open the likelihood that, regardless of the possibility that Kaspersky’s AV helped Russia home in on the exceptionally touchy code and records, the revelation was the unintentional consequence of a product bug, and nobody from Kaspersky Lab collaborated with the attackers in any capacity. Likewise lost in the emphasis on Kaspersky Lab is the startling disclosure that yet another NSA insider figured out how to sneak arranged material outside of the NSA’s system and put it on an unsecured PC.


First, here’s a summary of what the WSJ reported.

The unnamed contractor removed the material from the NSA and stored it on a home computer that ran a version of Kaspersky AV. The material, according to the unnamed sources, included “details about how the NSA penetrates foreign computer networks, the computer code it uses for such spying, and how it defends networks inside the US.


Sometime in 2015, the material was stolen by Russia-sponsored hackers who appear to have targeted the contractor after identifying the files through the contractor’s use” of the Kaspersky AV. The breach was discovered in the first three months of 2016.


US investigators believe the contractor’s use of the software alerted Russian hackers to the presence of files that may have been taken from the NSA, according to people with knowledge of the investigation. Experts said the software, in searching for malicious code, may have found samples of it in the data the contractor removed from the NSA.


But how the antivirus system made that determination is unclear, such as whether Kaspersky technicians programed the software to look for specific parameters that indicated NSA material. Also unclear is whether Kaspersky employees alerted the Russian government to the finding.


Investigators did determine that, armed with the knowledge that Kaspersky’s software provided of what files were suspected on the contractor’s computer, hackers working for Russia homed in on the machine and obtained a large amount of information, according to the people familiar with the matter.



Remember Equation Group?

The hypothesis is made more conceivable by the way that, by 2015, Kaspersky Lab had nitty gritty information of a portion of the NSA’s most tip top hacking devices and techniques. Organization scientists had gained this information in the wake of doing comprehensive research into a gathering it named the Equation Group.


As Ars announced in February of that year, the hacking group was unmistakably attached to the NSA—if not a piece of it—by its propelled access to zero-day abuses that would later be utilized as a part of the Stuxnet worm that supposedly was created together by the NSA and its partners in Israel.


In an e-mailed statement, Kaspersky officials wrote:

Kaspersky Lab has not been provided any evidence substantiating the company’s involvement in the alleged incident reported by the Wall Street Journal on October 5, 2017, and it is unfortunate that news coverage of unproven claims continue to perpetuate accusations about the company.

As a private company, Kaspersky Lab does not have inappropriate ties to any government, including Russia, and the only conclusion seems to be that Kaspersky Lab is caught in the middle of a geopolitical fight.


We make no apologies for being aggressive in the battle against malware and cyber-criminals. The company actively detects and mitigates malware infections, regardless of the source, and we have been proudly doing so for 20 years, which has led to continuous top ratings in independent malware detection tests.


It’s also important to note that Kaspersky Lab products adhere to the cyber-security industry’s strict standards and have similar levels of access and privileges to the systems they protect as any other popular security vendor in the US and around the world.


Read More on Hacker News –

New Exploit – Remote WiFi Attack Backdoors in iPhone 7

Hackers made over $60k hijacking people’s computers to mine Cryptocurrency

OurMine Hackers – VEVO Music Video 3.12TB of Data Leaked

BlueBorne – Now Hackers can hack you in 10 Sec using Bluetooth

Ref. ArsTech