Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Russian researchers expose NSA secret weapon: Program that enables America to spy on every computer
DailyMail ^ | 16 February 2015 | Reuters Reporter and Chris Spargo

Posted on 02/17/2015 9:02:27 AM PST by dennisw

The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists.

The National Security Agency has figured out how to hide spying software deep within hard drives, allowing them to monitor and eavesdrop on the majority of the world's computers - even when they are not connected to the internet.

This 'surpasses anything known in terms of complexity and sophistication of techniques, and that has been active for almost two decades,' said Kaspersky.

'The hardware will be able to infect the computer over and over,' lead Kaspersky researcher Costin Raiu said in an interview.

According to Kaspersky, the spies made a technological breakthrough by figuring out how to lodge malicious software in the obscure code called firmware that launches every time a computer is turned on.

Disk drive firmware is viewed by spies and cybersecurity experts as the second-most valuable real estate on a PC for a hacker, second only to the BIOS code invoked automatically as a computer boots up.

What's more, even the makers of these hard drives are unaware that these spying programs have been installed, with the NSA obtaining their source codes by going so far as to pose as software developers according to former intelligence operatives, or telling the companies the government must do a security audit to make sure their source code is safe.

The group said it found personal computers in 30 countries infected The most infections were seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria

The Moscow-based security software maker Kaspersky Lab said it has found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria.

(Excerpt) Read more at dailymail.co.uk ...


TOPICS: Business/Economy; Culture/Society; Foreign Affairs; Russia
KEYWORDS: kaspersky; nsa; pravda; russia
Navigation: use the links below to view more comments.
first 1-2021-4041-52 next last

1 posted on 02/17/2015 9:02:27 AM PST by dennisw
[ Post Reply | Private Reply | View Replies]

To: dennisw

Kaspersky’s reconstructions of the spying programs show that they could work in disk drives sold by more than a dozen companies, comprising essentially the entire market. They include Western Digital Corp, Seagate Technology Plc, Toshiba Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd.

Western Digital, Seagate and Micron said they had no knowledge of these spying programs. Toshiba and Samsung declined to comment. IBM did not respond to requests for comment.

Getting the source code

Raiu said the authors of the spying programs must have had access to the proprietary source code that directs the actions of the hard drives. That code can serve as a roadmap to vulnerabilities, allowing those who study it to launch attacks much more easily.

‘There is zero chance that someone could rewrite the [hard drive] operating system using public information,’ Raiu said.

Concerns about access to source code flared after a series of high-profile cyberattacks on Google Inc and other U.S. companies in 2009 that were blamed on China. Investigators have said they found evidence that the hackers gained access to source code from several big U.S. tech and defense companies.

It is not clear how the NSA may have obtained the hard drives’ source code. Western Digital spokesman Steve Shattuck said the company ‘has not provided its source code to government agencies.’ The other hard drive makers would not say if they had shared their source code with the NSA.

Seagate spokesman Clive Over said it has ‘secure measures to prevent tampering or reverse engineering of its firmware and other technologies.’ Micron spokesman Daniel Francisco said the company took the security of its products seriously and ‘we are not aware of any instances of foreign code.’
Kaspersky uncovers online spy tools with apparent links to NSA

According to former intelligence operatives, the NSA has multiple ways of obtaining source code from tech companies, including asking directly and posing as a software developer. If a company wants to sell products to the Pentagon or another sensitive U.S. agency, the government can request a security audit to make sure the source code is safe.

‘They don’t admit it, but they do say, “We’re going to do an evaluation, we need the source code,”’ said Vincent Liu, a partner at security consulting firm Bishop Fox and former NSA analyst. ‘It’s usually the NSA doing the evaluation, and it’s a pretty small leap to say they’re going to keep that source code.’

The NSA declined to comment on any allegations in the Kaspersky report. Vines said the agency complies with the law and White House directives to protect the United States and its allies ‘from a wide array of serious threats.’

Kaspersky called the authors of the spying program ‘the Equation group,’ named after their embrace of complex encryption formulas.

The group used a variety of means to spread other spying programs, such as by compromising jihadist websites, infecting USB sticks and CDs, and developing a self-spreading computer worm called Fanny, Kaspersky said.

Fanny was like Stuxnet in that it exploited two of the same undisclosed software flaws, known as ‘zero days,’ which strongly suggested collaboration by the authors, Raiu said. He added that it was ‘quite possible’ that the Equation group used Fanny to scout out targets for Stuxnet in Iran and spread the virus.
Read more:


2 posted on 02/17/2015 9:04:56 AM PST by dennisw (The first principle is to find out who you are then you can achieve anything -- Buddhist monk)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dennisw

3 posted on 02/17/2015 9:04:56 AM PST by BenLurkin (The above is not a statement of fact. It is either satire or opinion. Or both.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dennisw

Just one more reason to go Galt.


4 posted on 02/17/2015 9:05:10 AM PST by dware (The GOP is dead. Long live Conservatism.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BenLurkin

NSA says to BenLurkin -— “How do you like me now!”


5 posted on 02/17/2015 9:05:50 AM PST by dennisw (The first principle is to find out who you are then you can achieve anything -- Buddhist monk)
[ Post Reply | Private Reply | To 3 | View Replies]

To: dennisw

Interesting that we find this from a UK source reporting on Russian research.

Not a peep from the US based A/V people?

Where is the NYT on this?


6 posted on 02/17/2015 9:07:05 AM PST by garyb
[ Post Reply | Private Reply | To 1 | View Replies]

To: dennisw

If this is true, this is terrible and will hurt US companies and interests around the world.


7 posted on 02/17/2015 9:08:04 AM PST by DonaldC (A nation cannot stand in the absence of religious principle.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dennisw

Kaspersky is world-famous, highly regarded Russian anti-malware software.

It protects my computer.


8 posted on 02/17/2015 9:12:26 AM PST by goldstategop (In Memory Of A Dearly Beloved Friend Who Lives In My Heart Forever)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dennisw

I love Big Brother.


9 posted on 02/17/2015 9:13:52 AM PST by BenLurkin (The above is not a statement of fact. It is either satire or opinion. Or both.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: dennisw
… allowing them to monitor and eavesdrop on the majority of the world’s computers—even when they are not connected to the internet
Oh brother. Sounds like another attempt to resurrect the tin-foil hat industry.
10 posted on 02/17/2015 9:14:05 AM PST by Olog-hai
[ Post Reply | Private Reply | To 1 | View Replies]

To: Olog-hai

It reports back to the mothership WHEN you do get on the internets...duh


11 posted on 02/17/2015 9:17:07 AM PST by dennisw (The first principle is to find out who you are then you can achieve anything -- Buddhist monk)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Olog-hai

AFDB, baby!
http://zapatopi.net/afdb/


12 posted on 02/17/2015 9:18:04 AM PST by Jack Hydrazine (Pubbies = national collectivists; Dems = international collectivists; We need a second party!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: goldstategop

Kaspersky is state of the art.....if anyone was going to uncover this it was going to be them


13 posted on 02/17/2015 9:18:32 AM PST by dennisw (The first principle is to find out who you are then you can achieve anything -- Buddhist monk)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Olog-hai

I think the author meant that they do the monitoring, but are unable to send the information anywhere. I don’t know what use that would be. They could store it in secret files and send it later, perhaps.


14 posted on 02/17/2015 9:19:56 AM PST by proxy_user
[ Post Reply | Private Reply | To 10 | View Replies]

To: dennisw
Dose someone have a fix for it? Are there any scans that can detect the malicious code - and if so - are they reliable to where the scanners have not been compromised.

This crazy thing we call computers is getting interesting....

15 posted on 02/17/2015 9:20:06 AM PST by BCW (ARMIS EXPOSCERE PACEM)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dennisw

Then that is what should have been said. As written, it says that communication while offline is not only possible but a fait accompli.


16 posted on 02/17/2015 9:21:49 AM PST by Olog-hai
[ Post Reply | Private Reply | To 11 | View Replies]

To: dennisw

How many Freepers remember the good old days when the USSR, not the US government, was the looming threat to our freedoms?


17 posted on 02/17/2015 9:22:35 AM PST by Iron Munro (Mark Steyn: “fundamentally transformed” is a euphemism for “wrecked beyond repair.”)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BenLurkin

Is O’Brien a Freeper?


18 posted on 02/17/2015 9:22:59 AM PST by Jan_Sobieski (Sanctification)
[ Post Reply | Private Reply | To 9 | View Replies]

To: dennisw

The article said ... “It is not clear how the NSA may have obtained the hard drives’ source code. Western Digital spokesman Steve Shattuck said the company ‘has not provided its source code to government agencies.’ The other hard drive makers would not say if they had shared their source code with the NSA.”

— — —

WELL ... a boatload of money from one of these agencies to someone on the inside would “shake loose” the source code! ... :-) ...

I wouldn’t think it would be that hard.


19 posted on 02/17/2015 9:24:00 AM PST by Star Traveler (Remember to keep the Messiah of Israel in the One-World Government that we look forward to coming)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Olog-hai

I don’t think so...most storage programs can queue up information until they are connected...


20 posted on 02/17/2015 9:24:29 AM PST by Jan_Sobieski (Sanctification)
[ Post Reply | Private Reply | To 10 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-52 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson