Free Republic
Browse · Search
News/Activism
Topics · Post Article


1 posted on 02/17/2015 9:02:27 AM PST by dennisw
[ Post Reply | Private Reply | View Replies ]


To: dennisw

Kaspersky’s reconstructions of the spying programs show that they could work in disk drives sold by more than a dozen companies, comprising essentially the entire market. They include Western Digital Corp, Seagate Technology Plc, Toshiba Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd.

Western Digital, Seagate and Micron said they had no knowledge of these spying programs. Toshiba and Samsung declined to comment. IBM did not respond to requests for comment.

Getting the source code

Raiu said the authors of the spying programs must have had access to the proprietary source code that directs the actions of the hard drives. That code can serve as a roadmap to vulnerabilities, allowing those who study it to launch attacks much more easily.

‘There is zero chance that someone could rewrite the [hard drive] operating system using public information,’ Raiu said.

Concerns about access to source code flared after a series of high-profile cyberattacks on Google Inc and other U.S. companies in 2009 that were blamed on China. Investigators have said they found evidence that the hackers gained access to source code from several big U.S. tech and defense companies.

It is not clear how the NSA may have obtained the hard drives’ source code. Western Digital spokesman Steve Shattuck said the company ‘has not provided its source code to government agencies.’ The other hard drive makers would not say if they had shared their source code with the NSA.

Seagate spokesman Clive Over said it has ‘secure measures to prevent tampering or reverse engineering of its firmware and other technologies.’ Micron spokesman Daniel Francisco said the company took the security of its products seriously and ‘we are not aware of any instances of foreign code.’
Kaspersky uncovers online spy tools with apparent links to NSA

According to former intelligence operatives, the NSA has multiple ways of obtaining source code from tech companies, including asking directly and posing as a software developer. If a company wants to sell products to the Pentagon or another sensitive U.S. agency, the government can request a security audit to make sure the source code is safe.

‘They don’t admit it, but they do say, “We’re going to do an evaluation, we need the source code,”’ said Vincent Liu, a partner at security consulting firm Bishop Fox and former NSA analyst. ‘It’s usually the NSA doing the evaluation, and it’s a pretty small leap to say they’re going to keep that source code.’

The NSA declined to comment on any allegations in the Kaspersky report. Vines said the agency complies with the law and White House directives to protect the United States and its allies ‘from a wide array of serious threats.’

Kaspersky called the authors of the spying program ‘the Equation group,’ named after their embrace of complex encryption formulas.

The group used a variety of means to spread other spying programs, such as by compromising jihadist websites, infecting USB sticks and CDs, and developing a self-spreading computer worm called Fanny, Kaspersky said.

Fanny was like Stuxnet in that it exploited two of the same undisclosed software flaws, known as ‘zero days,’ which strongly suggested collaboration by the authors, Raiu said. He added that it was ‘quite possible’ that the Equation group used Fanny to scout out targets for Stuxnet in Iran and spread the virus.
Read more:


2 posted on 02/17/2015 9:04:56 AM PST by dennisw (The first principle is to find out who you are then you can achieve anything -- Buddhist monk)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw

3 posted on 02/17/2015 9:04:56 AM PST by BenLurkin (The above is not a statement of fact. It is either satire or opinion. Or both.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw

Just one more reason to go Galt.


4 posted on 02/17/2015 9:05:10 AM PST by dware (The GOP is dead. Long live Conservatism.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw

Interesting that we find this from a UK source reporting on Russian research.

Not a peep from the US based A/V people?

Where is the NYT on this?


6 posted on 02/17/2015 9:07:05 AM PST by garyb
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw

If this is true, this is terrible and will hurt US companies and interests around the world.


7 posted on 02/17/2015 9:08:04 AM PST by DonaldC (A nation cannot stand in the absence of religious principle.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw

Kaspersky is world-famous, highly regarded Russian anti-malware software.

It protects my computer.


8 posted on 02/17/2015 9:12:26 AM PST by goldstategop (In Memory Of A Dearly Beloved Friend Who Lives In My Heart Forever)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw
… allowing them to monitor and eavesdrop on the majority of the world’s computers—even when they are not connected to the internet
Oh brother. Sounds like another attempt to resurrect the tin-foil hat industry.
10 posted on 02/17/2015 9:14:05 AM PST by Olog-hai
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw
Dose someone have a fix for it? Are there any scans that can detect the malicious code - and if so - are they reliable to where the scanners have not been compromised.

This crazy thing we call computers is getting interesting....

15 posted on 02/17/2015 9:20:06 AM PST by BCW (ARMIS EXPOSCERE PACEM)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw

How many Freepers remember the good old days when the USSR, not the US government, was the looming threat to our freedoms?


17 posted on 02/17/2015 9:22:35 AM PST by Iron Munro (Mark Steyn: “fundamentally transformed” is a euphemism for “wrecked beyond repair.”)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw

Rockwell - Somebody’s Watching Me
https://www.youtube.com/watch?v=7bQwin3Vv0k


21 posted on 02/17/2015 9:24:29 AM PST by Jack Hydrazine (Pubbies = national collectivists; Dems = international collectivists; We need a second party!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw

Are there any smart software folks out there willing to go in on a free software program called “Big Brother Watcher”? The point is not to stop the intrusion, but rather to see it working on each person’s machine... ;-)


27 posted on 02/17/2015 9:27:31 AM PST by Jan_Sobieski (Sanctification)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw

NOTICE:

You have been identified and counted.

You are now Thought Criminal #193587406

Write down your number and report to the local DHS Kommissar at the nearest railroad station.

You are advised to bring warm clothing and a shovel.

The Ministry Of Truth thanks you in advance for your cooperation.

Failure to comply with these instructions will subject you to immediate reclassification as a Domestic Terrorist.

Have A Nice Day


30 posted on 02/17/2015 9:32:42 AM PST by Iron Munro (Mark Steyn: “fundamentally transformed” is a euphemism for “wrecked beyond repair.”)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw

Here is a summary report in PDF format (44pages)

http://25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com/files/2015/02/Equation_group_questions_and_answers.pdf


32 posted on 02/17/2015 9:37:36 AM PST by PrairieLady2
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw

If ANYONE on this site didn’t believe this was possible since say about 1995, they’re absolutely delusional. Regardless of method, EVERYTHING can be hacked, period.


38 posted on 02/17/2015 10:16:32 AM PST by TexasGunLover ("Either you're with us or you're with the terrorists."-- President George W. Bush)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dennisw
Firmware malware is actually pretty old. For flashable firmware, you can get to it if the computer is on. If is isn't flashable (meaning it is only flashed one time), you need to get to it prior to installation at the factory.

There were rumors that somebody got to some of Saddam's computers this way, through printer firmware IIRC. I do not know if the rumors were true.

47 posted on 02/17/2015 2:49:46 PM PST by Billthedrill
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson