Dear Visitor,

Our system has found that you are using an ad-blocking browser add-on.

We just wanted to let you know that our site content is, of course, available to you absolutely free of charge.

Our ads are the only way we have to be able to bring you the latest high-quality content, which is written by professional journalists, with the help of editors, graphic designers, and our site production and I.T. staff, as well as many other talented people who work around the clock for this site.

So, we ask you to add this site to your Ad Blocker’s "white list" or to simply disable your Ad Blocker while visiting this site.

Continue on this site freely
You are here: Home / Viruses & Malware / Kaspersky Defends Role in NSA Hack
Kaspersky: We Extracted NSA Files -- But We Didn't Mean To
Kaspersky: We Extracted NSA Files -- But We Didn't Mean To
By Allen Cone Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
Kaspersky Lab, the Russian-headquartered anti-virus company, confirmed Wednesday it extracted sensitive files from a U.S. National Security Agency worker's computer, but said it wasn't a deliberate move.

The company conducted its own investigation after The Wall Street Journal on Oct. 5 reported Russian hackers spied on the U.S. government using Kaspersky software to find and steal classified files on the NSA contractor's home computer.

"Given that Kaspersky Lab has been at the forefront of fighting cyberespionage and cybercriminal activities on the Internet for over 20 years now, these allegations were treated very seriously," Kaspersky said in its 13-page report. "To assist any independent investigators and all the people who have been asking us questions whether those allegations were true, we decided to conduct an internal investigation to attempt to answer a few questions we had related to the article and some others."

Kaspersky says a poorly secured PC with a pirated version of Microsoft Office sent NSA files to its servers from Sept. 11 to Nov. 9, 2014, from a Verizon FiOS address pool for the Baltimore, Md., area. The servers downloaded the files after the antivirus software flagged them for containing malicious code.

"The reason we deleted those files and will delete similar ones in the future is two-fold," Kaspersky Lab officials wrote in Thursday's report. "We don't need anything other than malware binaries to improve protection of our customers and secondly, because of concerns regarding the handling of potential classified materials. Assuming that the markings were real, such information cannot and will not [be] consumed even to produce detection signatures based on descriptions."

Eugene Kaspersky, the company's founder and chief executive, ordered the classified data deleted from the company's systems.

Kaspersky said "we also found no indication the information ever left our corporate networks," including Russian spies.

Five days after the Wall Street Journal findings, The New York Times reported that Israel alerted the United States that Kaspersky software was being used for espionage.

Kaspersky said the only third-party intrusion in its networks was by Duqu 2.0 -- malware linked to Israeli intelligence.

U.S. federal agencies have now been told to remove all Kaspersky software from their computers.

"It is appalling to see that accusations against our company continue to appear without any proof or factual information being presented," Kaspersky said in the report. "Rumors, anonymous sources, and lack of hard evidence spreads only fear, uncertainty and doubt. We hope that this report sheds some long-overdue light to the public and allows people to draw their own conclusions based on the facts presented above. We are also open and willing to do more, should that be required."

© 2018 UPI International Top News under contract with NewsEdge/Acquire Media. All rights reserved.

Image credit: iStock/Artist's Concept.

Tell Us What You Think


Like Us on FacebookFollow Us on Twitter

Since the major processor-based Spectre and Meltdown vulnerabilities came to light recently, technology firms have been working to develop and deploy patches across millions, if not billions, of devices.

Another password bug has been uncovered in macOS High Sierra, and while it's not nearly as serious as the one that cropped up late last year, it's still highly embarrassing for Apple.

© Copyright 2018 NewsFactor Network. All rights reserved. Member of Accuserve Ad Network.