Kaspersky’s reconstructions of the spying programs show that they could work in disk drives sold by more than a dozen companies, comprising essentially the entire market. They include Western Digital Corp, Seagate Technology Plc, Toshiba Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd.
Western Digital, Seagate and Micron said they had no knowledge of these spying programs. Toshiba and Samsung declined to comment. IBM did not respond to requests for comment.
Getting the source code
Raiu said the authors of the spying programs must have had access to the proprietary source code that directs the actions of the hard drives. That code can serve as a roadmap to vulnerabilities, allowing those who study it to launch attacks much more easily.
‘There is zero chance that someone could rewrite the [hard drive] operating system using public information,’ Raiu said.
Concerns about access to source code flared after a series of high-profile cyberattacks on Google Inc and other U.S. companies in 2009 that were blamed on China. Investigators have said they found evidence that the hackers gained access to source code from several big U.S. tech and defense companies.
It is not clear how the NSA may have obtained the hard drives’ source code. Western Digital spokesman Steve Shattuck said the company ‘has not provided its source code to government agencies.’ The other hard drive makers would not say if they had shared their source code with the NSA.
Seagate spokesman Clive Over said it has ‘secure measures to prevent tampering or reverse engineering of its firmware and other technologies.’ Micron spokesman Daniel Francisco said the company took the security of its products seriously and ‘we are not aware of any instances of foreign code.’
Kaspersky uncovers online spy tools with apparent links to NSA
According to former intelligence operatives, the NSA has multiple ways of obtaining source code from tech companies, including asking directly and posing as a software developer. If a company wants to sell products to the Pentagon or another sensitive U.S. agency, the government can request a security audit to make sure the source code is safe.
‘They don’t admit it, but they do say, “We’re going to do an evaluation, we need the source code,”’ said Vincent Liu, a partner at security consulting firm Bishop Fox and former NSA analyst. ‘It’s usually the NSA doing the evaluation, and it’s a pretty small leap to say they’re going to keep that source code.’
The NSA declined to comment on any allegations in the Kaspersky report. Vines said the agency complies with the law and White House directives to protect the United States and its allies ‘from a wide array of serious threats.’
Kaspersky called the authors of the spying program ‘the Equation group,’ named after their embrace of complex encryption formulas.
The group used a variety of means to spread other spying programs, such as by compromising jihadist websites, infecting USB sticks and CDs, and developing a self-spreading computer worm called Fanny, Kaspersky said.
Fanny was like Stuxnet in that it exploited two of the same undisclosed software flaws, known as ‘zero days,’ which strongly suggested collaboration by the authors, Raiu said. He added that it was ‘quite possible’ that the Equation group used Fanny to scout out targets for Stuxnet in Iran and spread the virus.
Read more:
Just one more reason to go Galt.
Interesting that we find this from a UK source reporting on Russian research.
Not a peep from the US based A/V people?
Where is the NYT on this?
If this is true, this is terrible and will hurt US companies and interests around the world.
Kaspersky is world-famous, highly regarded Russian anti-malware software.
It protects my computer.
allowing them to monitor and eavesdrop on the majority of the worlds computerseven when they are not connected to the internetOh brother. Sounds like another attempt to resurrect the tin-foil hat industry.
This crazy thing we call computers is getting interesting....
How many Freepers remember the good old days when the USSR, not the US government, was the looming threat to our freedoms?
Rockwell - Somebody’s Watching Me
https://www.youtube.com/watch?v=7bQwin3Vv0k
Are there any smart software folks out there willing to go in on a free software program called “Big Brother Watcher”? The point is not to stop the intrusion, but rather to see it working on each person’s machine... ;-)
NOTICE:
You have been identified and counted.
You are now Thought Criminal #193587406
Write down your number and report to the local DHS Kommissar at the nearest railroad station.
You are advised to bring warm clothing and a shovel.
The Ministry Of Truth thanks you in advance for your cooperation.
Failure to comply with these instructions will subject you to immediate reclassification as a Domestic Terrorist.
Have A Nice Day
Here is a summary report in PDF format (44pages)
If ANYONE on this site didn’t believe this was possible since say about 1995, they’re absolutely delusional. Regardless of method, EVERYTHING can be hacked, period.
There were rumors that somebody got to some of Saddam's computers this way, through printer firmware IIRC. I do not know if the rumors were true.