找回密碼
 註冊
查看: 4263|回覆: 19

美國間諜總部被俄國佬劈,用卡巴斯基殺毒軟件 [轉載, 英文]

    [複製鏈接]
簽到
3092
發表於 2017-10-7 06:12:59 | 顯示全部樓層 |閱讀模式
本帖最後由 jgyjgw 於 2017-10-7 06:14 編輯

美國間諜總部被俄國佬劈的內幕, 卡巴斯基普通殺毒軟件,專掃描收取秘密文件. [轉載, 英文]
原來系被越南仔承包商漏出. 卡巴斯基殺毒軟件整古.

Ex-NSA Hackers Are Not Surprised by Bombshell Kaspersky Report

https://motherboard.vice.com/en_us/article/kz755a/ex-nsa-hackers-are-not-surprised-by-bombshell-kaspersky-report
Lorenzo Franceschi-Bicchierai     Oct 6 2017, 7:21am


Russian hackers managed to steal sensitive files from the home computer of an NSA contractor who used Kaspersky Lab's antivirus, according to the The Wall Street Journal. The revelation sheds light on the secretive reasons behind the US government ban of Kaspersky Lab products, and former NSA hackers I spoke to said they weren't surprised by the story, saying that it could explain rumors of a leaker at the NSA that have swirled for a year.
On Thursday,  the Journal reported that in 2015 Russian hackers identified sensitive NSA files on the home computer of an NSA contractor thanks to their use of Kaspersky Lab antivirus, which apparently detected samples of NSA files on the contractor's computer. According to the report, the hackers detected that the contractor had files it deemed valuable because the contractor used the Kaspersky antivirus software on their computer.  The Journal didn't provide details on exactly how the hackers retrieved those files, whether Kaspersky was aware its software was being used this way, or if it alerted the Russian government to these findings.

The breach wasn't identified until 2016, according to the report. If true, this is the third major breach of sensitive information from the NSA after contractors Edward Snowden and Harold Martin took files outside of the spy agency's buildings.

Eugene Kaspersky, the founder of the eponymous company, dismissed the new report.

"We have not been provided any evidence substantiating the company's involvement in the alleged incident," Kaspersky told me in a Twitter direct message, which preceded a longer statement. "And it is unfortunate that news coverage of unproven claims continue to perpetuate accusations about the company."

But the idea of a third leaker, or at the very least, a third breach at the NSA has been circulating for at least a year: Last year,  The Washington Post reported the existence of a third, unknown leaker from the NSA. On Thursday, the newspaper confirmed that person is the same one mentioned in the  WSJ story.

Besides that, I spoke to four different former NSA employees in an attempt to put the  Wall Street Journal article in context. Each of them said the report aligns closely with rumors that have been circulating in government infosec circles.

A former NSA hacker, who asked to remain anonymous to talk about sensitive matters, told me that the  WSJ report did not surprise them. Rumors of a third data breach or leaker had been swirling among former NSA employees for around a year. Two other former NSA employees, who also requested anonymity, confirmed there was a rumor of a third leaker.

"There's a lot of concern over more leaks, and not knowing where they're coming from and not being able to control them," a fourth former NSA employee, who also asked not to be named, told me in a phone call.
In any case, according to my sources, it makes sense that antivirus companies would be targeted or used as leverage to hack other targets by government spies and hackers.

"Antivirus companies are gold mines for espionage groups, whether it's permitted or unwitting access," the first ex-NSA hacker told me. In this case, he said, either Kaspersky Lab helped the Russian hackers directly, or the hackers exploited Kaspersky software without the company's knowledge.

A former member of the US intelligence community told me that  The Wall Street Journal story fits with what he knows firsthand about how Kaspersky's antivirus software works.

"The software, by design, is able to suck up any file Kaspersky tasks it to," the source, who asked to remain anonymous, told me. "They can make it grab any file that meets a signature globally or target it down to a specific machine."

This might just be how the company hunts for malware, much like other antivirus companies. In any case, Kaspersky denied this accusation as well.

"This is nonsense and misinterpretation of a common approach in the cybersecurity industry," Kaspersky told me.
Kaspersky Lab itself has been the victim of government hackers. In 2015, the company revealed that government spies, likely from Israel, had breached its internal systems—using a new version of a malware previously discovered by Kaspersky itself.

The Wall Street Journal story doesn't mention that this incident with the unnamed contractor is how the mysterious hacking group The Shadow Brokers obtained the top secret documents and hacking tools that they've been leaking for more than year now. But some experts are already timidly connecting the dots.

"Very cautious working assumption: yes," tweeted Thomas Rid, a professor at Johns Hopkins who has been studying Russian government hacking operations for years.
Motherboard can't confirm that Kaspersky software was used to detect NSA files on a contractor's computer as the  The Journal reported, but the Russian antivirus company has been able to detect NSA software in the past. Kaspersky published two major reports on alleged GCHQ and NSA hacking operations late 2014 and early 2015, codenamed Regin and Equation Group. Regin was a sophisticated malware used to hack a Belgian telecom provider, and the company also published a lengthy report on several types malware attributed to the group codenamed Equation Group, which is largely believed to be the NSA.

Since Kaspersky was able to detect NSA malware, one possible explanation is that the Kaspersky Lab antivirus installed on the NSA contractor computer detected the sensitive files because they contained digital signatures related to the known Equation Group malware, as security and intelligence expert (and occasional Motherboard contributor) Marcy Wheeler wrote in a blog post.

As Rid tweeted, the new  WSJ report answers a few questions, but raises many more. There is reason, now, to believe we might soon be able to start connecting the dots between this third major breach within the NSA, and the shadowy group that's been leaking the spy agency's hacking tools for months.

Got a tip? You can contact this reporter securely on Signal at +1 917 257 1382, OTR chat at [email protected], or email   [email protected]

登入後,內容更豐富

您需要 登錄 才可以下載或查看,沒有賬號?註冊

×
 樓主| 發表於 2017-10-7 06:22:53 | 顯示全部樓層
Kaspersky Lab denies involvement in Russian hack of NSA contractor
原來系被越南仔承包商漏出. 卡巴斯基殺毒軟件整古.

https://www.theguardian.com/tech ... a-contractor-moscow

Moscow-based cybersecurity firm Kaspersky Lab has hit back at a report in the Wall Street Journal which accused it of being involved in a Russian government hack of an NSA contractor in 2015.
The paper reported on Thursday that the NSA contractor, a Vietnamese national who was working to create replacements for the hacking tools leaked by Edward Snowden, was hacked on his personal computer after he took his work home.

There, the report says, the contractor’s use of Kaspersky’s antivirus software “alerted Russian hackers to the presence of files that may have been taken from the NSA”. Once the machine was in their sights, the Russian hackers infiltrated it and obtained a significant amount of data, according to the paper.

Calling the allegations “like the script of a C movie”, Eugene Kaspersky, the infosec firm’s founder, gave his own explanation of what might have happened.

Mr Kaspersky vehemently denied that his company had played any active role in the breach, noting: “We never betray the trust that our users put into our hands. If we would do that a single time that would be immediately spotted by the industry and our business would be done.”

Instead, he implied that the root of the problem was that Kaspersky Lab had correctly identified the hacking tools the contractor was working on as malware – perhaps through Kaspersky Lab’s own research into the Equation Group, a “sophisticated cyber espionage platform” believed to be linked to the NSA.
From there, Mr Kaspersky implies, it may be the case that Kaspersky Lab’s own data was hacked by the Russian government. “Even though we have an internal security team, and do bug bounties, we can’t give 100% guarantee that there are no security issues in our products, name another security software vendor who can!”
Kaspersky’s defence is roughly in line with the general consensus amongnonaligned information security experts. Matthew Green, a cryptography professor at Johns Hopkins University, wrote: “Consensus on infosec Twitter is that Kaspersky may not have colluded with [the Russian government]; just maybe their product may be horrendously compromised.

“Not quite sure how that’s qualitatively different from the point of view of Kaspersky customers. But I guess it’s something.”
In an unusual move for a technology chief executive, Mr Kaspersky republished Green’s tweet calling his product “horrendously compromised” in his own blogpost.

The hacking incident in question may be the key evidence used in September to drive a US government-wide ban of Kaspersky products.
At the time, the Department of Homeland Security said it “is concerned about the ties between certain Kaspersky officials and Russian intelligence and other government agencies, and requirements under Russian law that allow Russian intelligence agencies to request or compel assistance from Kaspersky and to intercept communications transiting Russian networks”.

In an official statement about the allegations, Kaspersky Lab said: “As a private company, Kaspersky Lab does not have inappropriate ties to any government, including Russia, and the only conclusion seems to be that Kaspersky Lab is caught in the middle of a geopolitical fight.”
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-7 08:14:35 | 顯示全部樓層
網絡攻擊, 威力不容忽視
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-7 09:01:09 | 顯示全部樓層
真係有好多內幕
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-7 09:22:33 | 顯示全部樓層
Kaspersjy is an excellent anti virus software.
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-7 10:47:16 | 顯示全部樓層
生活太過智能化 就毫無私隱可言
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-7 12:02:25 | 顯示全部樓層
兵贼難分
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-7 12:32:50 | 顯示全部樓層
資訊科技普及化下的犠牲者。
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-7 17:14:34 | 顯示全部樓層
回復 jgyjgw #2 的帖子

知道太多內幕秘密,會巧危險的
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-7 19:13:52 | 顯示全部樓層
甘多英門

補充內容 (2017-10-7 19:15):
越高科技,越多漏洞
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-7 20:21:09 | 顯示全部樓層
回復 jgyjgw #1 的帖子

軟件間諜戦
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-7 21:22:14 | 顯示全部樓層
本帖最後由 沈陽海哥 於 2017-10-7 21:24 編輯

軟件戦,after 卡巴斯基 they apooint the China fake hero, Jackie as their sales agent,
their product sales had been drop very much... force put some news for new products
回覆 讚好 不讚 使用道具

舉報

 樓主| 發表於 2017-10-7 23:26:32 | 顯示全部樓層
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-8 01:15:22 | 顯示全部樓層
係唔係專登架?
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-8 01:53:01 | 顯示全部樓層
大國電子戰,坐係到睇
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-8 12:59:34 | 顯示全部樓層
英文太多 睇唔明
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-9 00:32:50 | 顯示全部樓層

乜 AV SOFTWARE 都唔裝最好
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-9 10:23:04 | 顯示全部樓層
本帖最後由 沈陽海哥 於 2017-10-9 10:32 編輯

回復 jgyjgw #13 的帖子

Kaspersky 實驗室公司 和 他的CEO,  Eugene Kaspersky, 請 "成蟲" 做 國際貿易大使,
Kaspersky 的銷售量 和營業利潤,真是一落千丈, "成蟲" 證明又再次成功做 國際 "掃巴星" 明星。   

"成蟲"  真是害人王。
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-9 15:16:45 | 顯示全部樓層
馬後砲 發表於 2017-10-9 00:32
乜 AV SOFTWARE 都唔裝最好

如果用 Windows, 乜 AV SOFTWARE 都唔裝, 就自動 Activated Defender

E+ Edge 重黑人憎,成日彈出話自己好
回覆 讚好 不讚 使用道具

舉報

發表於 2017-10-12 00:12:30 | 顯示全部樓層
HKOXSEX 發表於 2017-10-9 15:16
如果用 Windows, 乜 AV SOFTWARE 都唔裝, 就自動 Activated Defender

E+ Edge 重黑人憎, ...

唔用windows囉!
回覆 讚好 不讚 使用道具

舉報

您需要登錄後才可以回帖 登錄 | 註冊

本版積分規則

Archiver|聯絡我們|141華人社區

GMT+8, 2024-11-27 09:39

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

快速回覆 返回頂部 返回列表