WSJ: ПО Лаборатории Касперского использовалось для шпионажа / новости :: антивирус :: Шпионаж :: kaspersky

kaspersky антивирус Шпионаж новости песочница 

WSJ: ПО Лаборатории Касперского использовалось для шпионажа

KA^PERjjg,kaspersky,антивирус,Шпионаж,новости,песочница

Антивирус искал файлы по словосочетанию «совершенно секретно» (top secret).
"Помимо этого в поисковые запросы добавляли кодовые наименования секретных программ США. Таковы результаты исследования работы антивируса американскими экспертами."
Было бы неплохо залить теробайты сериалов с именами типа: Top secret 01 и ожидать, что ФСБ создаст отдельный отдел про просмотру Санта-Барбары.
Источник: Медуза и Хартия.

Подробнее
KA^PERjjg
kaspersky,антивирус,Шпионаж,новости,песочница
Еще на тему
Развернуть
медуза и хартия лол иди нахуй в заблок,пидор политотный
oni-sama oni-sama 12.10.201711:13 ответить ссылка -5.8


Сильное обвинение.
Fleym Fleym 12.10.201711:19 ответить ссылка -0.7
Отбой, политолог, отбой.
все и так давно это знали - это классическое ублюдочное по которое шпионит за тобой за твои же деньги
еще и визжит, как свинья)
Кому не нравятся эти источники, вот вам другие:
https://www.wsj.com/articles/russian-hackers-scanned-networks-world-wide-for-secret-u-s-data-1507743874
Fleym Fleym 12.10.201712:06 ответить ссылка 0.4
к сожалению, регистрация не дала мне полную статью. Не мог бы ты сюда её залить?
mrg1 mrg1 12.10.201712:25 ответить ссылка 0.1
Могу но там многоангельскихбукаф. Если всем интересно, могу залить, конечно.
Fleym Fleym 12.10.201712:56 ответить ссылка 0.1
+0.4 я понимаю как "заливай". Варнинг! Многобукаф:
WASHINGTON—The Russian government used a popular antivirus software to secretly scan computers around the world for classified U.S. government documents and top-secret information, modifying the program to turn it into an espionage tool, according to current and former U.S. officials with knowledge of the matter.

The software, made by the Moscow-based company Kaspersky Lab, routinely scans files of computers on which it is installed looking for viruses and other malicious software. But in an adjustment to its normal operations that the officials say could only have been made with the company’s knowledge, the program searched for terms as broad as “top secret,” which may be written on classified government documents, as well as the classified code names of U.S. government programs, these people said.
The Wall Street Journal reported last week that Russian hackers used Kaspersky’s software in 2015 to target a contractor working for the National Security Agency, who had removed classified materials from his workplace and put them on his home computer, which was running the program. The hackers stole highly classified information on how the NSA conducts espionage and protects against incursions by other countries, said people familiar with the matter. An NSA spokesman didn’t comment on the breach.

But the use of the Kaspersky program to spy on the U.S. is broader and more pervasive than the operation against that one individual, whose name hasn’t been publicly released, current and former officials said.

Kaspersky Lab, founded by an engineer trained at a KGB technical school, has long insisted that it doesn’t assist the Russian government with spying on other countries. But many U.S. officials now think the evidence the U.S. has collected shows the company is a witting partner, said people familiar with the matter.

“There is no way, based on what the software was doing, that Kaspersky couldn’t have known about this,” said a former U.S. official with knowledge of information gleaned in 2015 about how the software was used to search for American secrets. He said the nature of the software is such that it would have had to be programmed to look for specific keywords, and Kaspersky’s employees likely would have known that was happening, this former official said.

The company said in a statement Wednesday that “Kaspersky Lab was not involved in and does not possess any knowledge of the situation in question, and the company reiterates its willingness to work alongside U.S. authorities to address any concerns they may have about its products as well as its systems.”

Representatives of the Russian government didn’t immediately respond to requests for comment. In a statement last week in response to the earlier Journal story, a Kremlin spokesman didn’t address whether the Russian government stole NSA materials using Kaspersky software.

A spokesman for the NSA declined to comment, as did a White House spokesman.

It remains unclear exactly how many other government computers or employees may have been targeted using the Kaspersky product or whether secret government material was stolen, said the people familiar with the matter.

After discovering the 2015 breach, U.S. officials began gathering other evidence that Kaspersky was being used to identify classified information and assist in its theft, said the people familiar with the matter.

For many months, U.S. intelligence agencies studied the software and even set up controlled experiments to see if they could trigger Kaspersky’s software into believing it had found classified materials on a computer being monitored by U.S. spies, these people said. Those experiments persuaded officials that Kaspersky was being used to detect classified information.

The government of Israel first alerted the U.S. that Kaspersky software was being used to find American intelligence information, after Israel’s own computer spies penetrated the networks of Kaspersky Lab beginning in 2014, the current and former officials said.

Once inside, the Israelis discovered how the software was being used and how Russia had obtained classified information from the NSA, these current and former officials said.

Israel’s spying on Kaspersky, which U.S. officials said provided crucial evidence that Kaspersky Lab was working with the Russian government, and the use of Kaspersky to scan for classified keywords was first reported Tuesday by the New York Times. Israeli officials didn’t immediately respond to requests for comment.

After the Israelis passed along what they knew to the U.S., officials at the NSA began an investigation that led to the contractor who had installed Kaspersky software on his personal computer at home. People familiar with that investigation say he appeared to have no ill intent, but knew that removing the classified material from the NSA’s headquarters campus at Fort Meade, Md., was a violation of agency rules and possibly a crime.

Last month, the Department of Homeland Security took the extraordinary step of banning all federal government agencies and departments from using Kaspersky goods and services. That action was a direct result of U.S. efforts to build a case against Kaspersky, said former officials involved in the work.

Until that decision was made, Kaspersky software was authorized for use in 22 government agencies, U.S. officials have said. It also is sold to U.S. consumers and companies.

“This new report further underscores the overwhelming case against Kaspersky Lab,” said Sen. Jeanne Shaheen (D., N.H.), who has redoubled her efforts in recent days to force the Trump administration to explain the damage the use of Kaspersky in government computers may have had. “These revelations should expedite efforts at the federal level to rid all federal infrastructure of Kaspersky Lab products.”

Ms. Shaheen reiterated her request for the Senate Armed Services Committee to hold a hearing on the “vulnerability to our national security.”

In a twist, Kaspersky appears to have known, or at least suspected, that it had been hacked by Israel. In June 2015, the company published a detailed technical analysis about malicious computer code used to break into its systems, which it dubbed Duqu 2.0. Experts believe that the original Duqu malware, on which the one inside Kaspersky’s system appears to have been based, was used to spy on officials participating in international negotiations over Iran’s nuclear program, a fact that Kaspersky acknowledged in its paper.

The Journal reported in 2015 that Israel had spied on closed-door talks among the U.S. and other world powers about curtailing Iran’s nuclear ambitions. Israeli officials denied spying directly on U.S. negotiators and said they received their information through other means, including close surveillance of Iranian leaders receiving the latest U.S. and European offers.

In its paper, Kaspersky Lab also noted the original Duqu’s technical and design links to an earlier, more famous malware known as Stuxnet, which was developed by the U.S. and Israel to disrupt Iran’s nuclear program.

The Kaspersky paper didn’t explicitly name Israel as the country that had penetrated the company, but people with knowledge of the operation confirmed that the company’s public technical analysis is referring to it.

Kaspersky Lab said in a statement that it “was not the only target” of the malware and “we are confident that we have identified and removed all of the infections that happened during that incident. Furthermore, Kaspersky Lab publicly reported the attack, and the company offered its assistance to affected or interested organizations to help mitigate this threat.”

Write to Shane Harris at shane.harris@wsj.com and Gordon Lubold at Gordon.Lubold@wsj.com
Fleym Fleym 12.10.201713:01 ответить ссылка 0.4
Спасибо!
Прям на цитаты:
1. made by the Moscow-based company Kaspersky Lab - просто надо переехать в Питер)
2. a contractor working for the National Security Agency, who had removed classified materials from his workplace and put them on his home computer, which was running the program. - это уже пипец для обращения с документами под грифом секретности. Дословно "контрагент принёс секретные документы со своего рабочего ПК на домашний".
3. Kaspersky Lab, founded by an engineer trained at a KGB technical school - тоже хорошо. Учитывая что криптография в любой стране
Ну и да, везде "said the people familiar with the matter."
А в целом, мощно конечно. Одним махом так подставить Израиль и их спецслужбы)))
mrg1 mrg1 12.10.201713:56 ответить ссылка 0.4
далек от всего этого. скажите просто - касперский это плохо?
касперский это хорошо, но весьма аппетитно по мощностям для ПК
Для энтерпрайза - хорошо
Для дома - хорошо и приятные скидки
mrg1 mrg1 12.10.201712:20 ответить ссылка -1.6
А США, таки, не заботит, что Изгаиль знает о называниях их секретных программ?)
mrg1 mrg1 12.10.201712:19 ответить ссылка -0.1
сколько же касперский скачал порнуху с домашних компов из папок "совершенно секретно".
Вообще лажово как то звучит, неужели спецслужбы хранят секретные файлы в папках с названием "совершенно секретно"? Это все равно что хранить прон в папке с название "прон" все же знают что он хранится в папке "учеба" или "работа"
Вот именно все знают что прон храниться в папках "учеба" "работа" "фото с каникул" "курсовая" и никто не догадается искать его в папке с названием прон.
grixt grixt 12.10.201715:29 ответить ссылка 0.4
Какой смысл это обсуждать?
Если это правда - то ничего удивительного.
Если это ложь или полуправда - тоже ничего удивительного.
Идёт война. Экономическая, политическая, информационная. И в этой войне ложь используют с обеих сторон.
Mpa3ukyc Mpa3ukyc 12.10.201716:04 ответить ссылка -1.3
Ахуеть новость, всё что можно использовать для шпионажа - будет использовано, это аксиома жи.
dim22 dim22 13.10.201701:37 ответить ссылка 0.4
Как и во всех последних набросах в сторону Россиии, статейка ссылается на анонимный источник и не даёт никаких пруфов.
Только зарегистрированные и активированные пользователи могут добавлять комментарии.
Похожие темы

Похожие посты
kaspersky
Даннам страница недоступна на территории РФ
Доступ « игформацахмсму ресурсу на территории Российски Федерации огриямем и4 0(«>ии^ Фелератгою миом» «06 информации информационен« '*.ио1«кид» о мни"* и-формацииг
ГЬтформк*'» о принятии мера« по огратгнегняо доступа» имрормациоминм ресурсам
подробнее»

kaspersky касперский новости Бред на обед it VPN блокировка сайтов

kaspersky Даннам страница недоступна на территории РФ Доступ « игформацахмсму ресурсу на территории Российски Федерации огриямем и4 0(«>ии^ Фелератгою миом» «06 информации информационен« '*.ио1«кид» о мни"* и-формацииг ГЬтформк*'» о принятии мера« по огратгнегняо доступа» имрормациоминм ресурсам