Israeli Spies Hacked Kaspersky

An Israeli security agency hacked into Russian antivirus firm Kaspersky Lab in 2015, providing the crucial evidence required to ban the company from providing services to the US government.

While the Israeli spies were inside Kaspersky’s systems, they observed Russian spies in turn using the company’s tools to spy on American spies. That information, handed to the US, led to the decision in September to end the use of the company’s software across the federal government by December.

The revelation answers some questions about the unfolding saga around Kaspersky Lab, a previously well-regarded information security firm founded in 1997 by Russian national Eugene Kaspersky. It seems to demonstrate why the US believes Kaspersky software was involved  in the hacking of an NSA contractor in 2015, as well as narrows down the nature of Kaspersky Lab’s supposed involvement in the Russian operation.

But it still leaves many further questions unanswered. Crucially for Kaspersky, the Israeli hack apparently failed to provide enough information to determine whether it was a willing, or even knowing, participant in the Russian espionage.

Kaspersky denies Spying for Russia  

Kaspersky vehemently denies being involved in any Russian spying activities

From spying on the Russian government hackers, Israeli intelligence has discovered that the hackers were using Kaspersky Lab anti-virus software to spy on US spies.

Back in 2015, Israeli intelligence officials hacked into Kaspersky systems and discovered the presence of an improvised search tool used to search computers worldwide for mentions of code names of American intelligence programmes.

While the case of spies spying on spies has only come to light now, the Israeli intelligence officials revealed their findings to the US which moved to ban the use of Kaspersky’s software on US government computers.

The use of this improvised search tool hidden in Kaspersky software appears to have been responsible for classified documents being stolen from the NSA.

It is as yet unclear on whether Kaspersky was involved in aiding the Russian hackers, or if the hackers simply used Kaspersky’s software as a backdoor onto computers worldwide that use the anti-virus.

Given anti-virus software generally has access to almost all the files on a computer in order to scan them for malicious code, a backdoor into it could effectively turn it into a hacker’s super weapon.

Kaspersky says No!

Kaspersky strongly denies any involvement in the hacking, with a spokesperson telling us: “Kaspersky Lab was not involved in and does not possess any knowledge of the situation in question.”

“Kaspersky Lab reiterates its willingness to work alongside US authorities to address any concerns they may have about its products as well as its systems, and respectfully requests any relevant, verifiable information that would help the company in its own investigation to certifiably refute the false accusations.

“Kaspersky Lab has never helped, nor will help, for any government in the world with its cyber-espionage efforts, and contrary to erroneous reports, Kaspersky Lab software does not contain any undeclared capabilities such as backdoors as that would be illegal and unethical.”
 
There is a strong chance that Russian hackers had breached Kaspersky Lab’s software without the cyber security company knowing it. And given such Russian hacking operation were discovered some time ago, there’s a chance that Kaspersky may have patched a backdoor, if it indeed existed, as part of its regular software updates.

It is very likely that more details of the Russian hacking operation will crop up over due course, but as it stands there is only room for speculation and paranoia at the moment.

But Kaspersky Lab chief executive Eugene Kaspersky is willing to work hard to show that his company in innocent in such hacking, as he has said he is willing to give US access to his company’s source code in an attempt to dispel rumours about ties to the Russian government.

Silicon:      Guardian:   Picured: Founder, Eugene Kaspersky

You Might Also Read:

Kaspersky Says We Can Trust Him:

UK National Cyber Security Centre Has Not Certified Kaspersky:

 

« AI Can Guess Your Password
Microsoft Chief Says N. Korea Was Behind 'WannaCry' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Broadcom

Broadcom

Broadcom is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions.

Interos

Interos

Interos is the operational resilience company — reinventing how companies manage their supply chains and business relationships — through a breakthrough AI SaaS platform.

Albania Lab

Albania Lab

Albania Lab is a consulting company focused on the development and delivery of digital solutions and IT services including cybersecurity.

CrowdSec

CrowdSec

CrowdSec is an open-source & participative IPS able to analyze visitor behavior by parsing logs & provide an adapted response to all kinds of attacks.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

Omnex

Omnex

Omnex provides consulting and training services in Quality, Environmental, and Health and Safety standards-based management systems including Automotive Cybersecurity.