<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: NSA-Linked Group Hacked?</title>
	<atom:link href="http://www.epanorama.net/blog/2016/08/16/nsa-linked-group-hacked/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/08/16/nsa-linked-group-hacked/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 04 May 2026 20:55:59 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/16/nsa-linked-group-hacked/comment-page-2/#comment-1617009</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 14 Dec 2018 09:43:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45534#comment-1617009</guid>
		<description><![CDATA[Tildeb: Analyzing the 18-year-old Implant from the Shadow Brokers’ Leak
https://blog.trendmicro.com/trendlabs-security-intelligence/tildeb-analyzing-the-18-year-old-implant-from-the-shadow-brokers-leak/]]></description>
		<content:encoded><![CDATA[<p>Tildeb: Analyzing the 18-year-old Implant from the Shadow Brokers’ Leak<br />
<a href="https://blog.trendmicro.com/trendlabs-security-intelligence/tildeb-analyzing-the-18-year-old-implant-from-the-shadow-brokers-leak/" rel="nofollow">https://blog.trendmicro.com/trendlabs-security-intelligence/tildeb-analyzing-the-18-year-old-implant-from-the-shadow-brokers-leak/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/16/nsa-linked-group-hacked/comment-page-2/#comment-1584508</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 12 Mar 2018 21:33:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45534#comment-1584508</guid>
		<description><![CDATA[Lily Hay Newman / Wired: 	
Alleged NSA EternalBlue exploit, which leaked a year ago, has become a go-to tool for hackers because of its versatility and the many machines still unpatched

The Leaked NSA Spy Tool That Hacked the World
https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world

An elite Russian hacking team, a historic ransomware attack, an espionage group in the Middle East, and countless small time cryptojackers all have one thing in common. Though their methods and objectives vary, they all lean on leaked NSA hacking tool EternalBlue to infiltrate target computers and spread malware across networks.

Leaked to the public not quite a year ago, EternalBlue has joined a long line of reliable hacker favorites.

The Conficker Windows worm infected millions of computers in 2008, and the Welchia remote code execution worm wreaked havoc 2003. EternalBlue is certainly continuing that tradition—and by all indications it&#039;s not going anywhere. 

&quot;When you take something that’s weaponized and a fully developed concept and make it publicly available you’re going to have that level of uptake,&quot;]]></description>
		<content:encoded><![CDATA[<p>Lily Hay Newman / Wired:<br />
Alleged NSA EternalBlue exploit, which leaked a year ago, has become a go-to tool for hackers because of its versatility and the many machines still unpatched</p>
<p>The Leaked NSA Spy Tool That Hacked the World<br />
<a href="https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world" rel="nofollow">https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world</a></p>
<p>An elite Russian hacking team, a historic ransomware attack, an espionage group in the Middle East, and countless small time cryptojackers all have one thing in common. Though their methods and objectives vary, they all lean on leaked NSA hacking tool EternalBlue to infiltrate target computers and spread malware across networks.</p>
<p>Leaked to the public not quite a year ago, EternalBlue has joined a long line of reliable hacker favorites.</p>
<p>The Conficker Windows worm infected millions of computers in 2008, and the Welchia remote code execution worm wreaked havoc 2003. EternalBlue is certainly continuing that tradition—and by all indications it&#8217;s not going anywhere. </p>
<p>&#8220;When you take something that’s weaponized and a fully developed concept and make it publicly available you’re going to have that level of uptake,&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/16/nsa-linked-group-hacked/comment-page-2/#comment-1584105</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 08 Mar 2018 14:36:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45534#comment-1584105</guid>
		<description><![CDATA[NSA Used Simple Tools to Detect Other State Actors on Hacked Devices
https://www.securityweek.com/nsa-used-simple-tools-detect-other-state-actors-hacked-devices

An analysis of leaked tools believed to have been developed by the U.S. National Security Agency (NSA) provides a glimpse into the methods used by the organization to detect the presence of other state-sponsored actors on hacked devices, and it could help the cybersecurity community discover previously unknown threats.

Over the past few years, a mysterious hacker group calling itself Shadow Brokers has been leaking tools allegedly created and used by the Equation Group, a threat actor widely believed to be linked to the NSA. The Shadow Brokers have been trying to sell Equation Group tools and exploits, but without much success. They say their main goal has been to make money, but many doubt their claims.]]></description>
		<content:encoded><![CDATA[<p>NSA Used Simple Tools to Detect Other State Actors on Hacked Devices<br />
<a href="https://www.securityweek.com/nsa-used-simple-tools-detect-other-state-actors-hacked-devices" rel="nofollow">https://www.securityweek.com/nsa-used-simple-tools-detect-other-state-actors-hacked-devices</a></p>
<p>An analysis of leaked tools believed to have been developed by the U.S. National Security Agency (NSA) provides a glimpse into the methods used by the organization to detect the presence of other state-sponsored actors on hacked devices, and it could help the cybersecurity community discover previously unknown threats.</p>
<p>Over the past few years, a mysterious hacker group calling itself Shadow Brokers has been leaking tools allegedly created and used by the Equation Group, a threat actor widely believed to be linked to the NSA. The Shadow Brokers have been trying to sell Equation Group tools and exploits, but without much success. They say their main goal has been to make money, but many doubt their claims.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/16/nsa-linked-group-hacked/comment-page-2/#comment-1576996</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Jan 2018 17:00:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45534#comment-1576996</guid>
		<description><![CDATA[NSA Contractor Pleads Guilty in Embarrassing Leak Case
http://www.securityweek.com/nsa-contractor-pleads-guilty-embarrassing-leak-case

A former contractor for the US National Security Agency&#039;s elite hacking group has agreed to plead guilty to removing classified documents in a case that highlighted a series of disastrous leaks of top-secret NSA materials. 

Harold Martin, who reportedly worked for an NSA unit focused on hacking into target computer systems around the world, will plead guilty to one of 20 counts against him with the aim of concluding a 15-month-old case couched in deep secrecy, according to court documents filed late Wednesday. 

The indictment filed on February 8, 2017 accused Martin of hoarding an estimated 50 terabytes of NSA data and documents in his home and car over a 20-year period. The material reportedly included sensitive digital tools for hacking foreign governments&#039; computers. 

His arrest in late 2016 followed the NSA&#039;s discovery that a batch of its hacking tools had fallen into the hands of a still-mysterious group called the Shadow Brokers, which offered them for sale online and also released some for free.

At least publicly, Martin has not been accused of responsibility for any NSA leaks.

In December, Nghia Hoang Pho, 67, a 10-year veteran of the NSA&#039;s Tailored Access Operations hacking unit, was charged with and agreed to plead guilty to one count of removing and retaining top-secret documents from the agency.

Vietnam-born Pho also had taken home highly classified NSA materials and programs.

According to The New York Times, apparent Russian hackers broke into his personal computer to steal the files, accessing them via Pho&#039;s use of Kaspersky software.

But that case also has not been linked to the Shadow Brokers theft.]]></description>
		<content:encoded><![CDATA[<p>NSA Contractor Pleads Guilty in Embarrassing Leak Case<br />
<a href="http://www.securityweek.com/nsa-contractor-pleads-guilty-embarrassing-leak-case" rel="nofollow">http://www.securityweek.com/nsa-contractor-pleads-guilty-embarrassing-leak-case</a></p>
<p>A former contractor for the US National Security Agency&#8217;s elite hacking group has agreed to plead guilty to removing classified documents in a case that highlighted a series of disastrous leaks of top-secret NSA materials. </p>
<p>Harold Martin, who reportedly worked for an NSA unit focused on hacking into target computer systems around the world, will plead guilty to one of 20 counts against him with the aim of concluding a 15-month-old case couched in deep secrecy, according to court documents filed late Wednesday. </p>
<p>The indictment filed on February 8, 2017 accused Martin of hoarding an estimated 50 terabytes of NSA data and documents in his home and car over a 20-year period. The material reportedly included sensitive digital tools for hacking foreign governments&#8217; computers. </p>
<p>His arrest in late 2016 followed the NSA&#8217;s discovery that a batch of its hacking tools had fallen into the hands of a still-mysterious group called the Shadow Brokers, which offered them for sale online and also released some for free.</p>
<p>At least publicly, Martin has not been accused of responsibility for any NSA leaks.</p>
<p>In December, Nghia Hoang Pho, 67, a 10-year veteran of the NSA&#8217;s Tailored Access Operations hacking unit, was charged with and agreed to plead guilty to one count of removing and retaining top-secret documents from the agency.</p>
<p>Vietnam-born Pho also had taken home highly classified NSA materials and programs.</p>
<p>According to The New York Times, apparent Russian hackers broke into his personal computer to steal the files, accessing them via Pho&#8217;s use of Kaspersky software.</p>
<p>But that case also has not been linked to the Shadow Brokers theft.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/16/nsa-linked-group-hacked/comment-page-2/#comment-1574024</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 12 Dec 2017 08:25:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45534#comment-1574024</guid>
		<description><![CDATA[Event Logs Manipulated With NSA Hacking Tool Recoverable
http://www.securityweek.com/event-logs-manipulated-nsa-hacking-tool-recoverable

Researchers at security firm Fox-IT have developed a tool that allows investigators to detect the use of specific NSA-linked malware and recover event log data it may have deleted from a machine.

The group calling itself Shadow Brokers has published several tools and exploits stolen from the Equation Group, cyberspies believed to be working for the U.S. National Security Agency (NSA). One of the tools leaked by the Shadow Brokers in April is DanderSpritz, a post-exploitation framework that allows hackers to harvest data, bypass and disable security systems, and move laterally within a compromised network.

An interesting DanderSpritz plugin is EventLogEdit, which is designed for manipulating Windows Event Log files to help attackers cover their tracks. While hacker tools that modify event logs are not unheard of, EventLogEdit is more sophisticated compared to others as it allows removal of individual entries from the Security, Application and System logs without leaving any obvious clues that the files had been edited.

“While we understand that event logs can be cleared and event logging stopped, surgically editing event logs is usually considered to be a very advanced capability (if possible at all),” Jake Williams, founder of Rendition Infosec and an expert in Shadow Broker leaks, said after news of the tool emerged. “Knowing that some attackers apparently have the ability to edit event logs can be a game changer for an investigation.”]]></description>
		<content:encoded><![CDATA[<p>Event Logs Manipulated With NSA Hacking Tool Recoverable<br />
<a href="http://www.securityweek.com/event-logs-manipulated-nsa-hacking-tool-recoverable" rel="nofollow">http://www.securityweek.com/event-logs-manipulated-nsa-hacking-tool-recoverable</a></p>
<p>Researchers at security firm Fox-IT have developed a tool that allows investigators to detect the use of specific NSA-linked malware and recover event log data it may have deleted from a machine.</p>
<p>The group calling itself Shadow Brokers has published several tools and exploits stolen from the Equation Group, cyberspies believed to be working for the U.S. National Security Agency (NSA). One of the tools leaked by the Shadow Brokers in April is DanderSpritz, a post-exploitation framework that allows hackers to harvest data, bypass and disable security systems, and move laterally within a compromised network.</p>
<p>An interesting DanderSpritz plugin is EventLogEdit, which is designed for manipulating Windows Event Log files to help attackers cover their tracks. While hacker tools that modify event logs are not unheard of, EventLogEdit is more sophisticated compared to others as it allows removal of individual entries from the Security, Application and System logs without leaving any obvious clues that the files had been edited.</p>
<p>“While we understand that event logs can be cleared and event logging stopped, surgically editing event logs is usually considered to be a very advanced capability (if possible at all),” Jake Williams, founder of Rendition Infosec and an expert in Shadow Broker leaks, said after news of the tool emerged. “Knowing that some attackers apparently have the ability to edit event logs can be a game changer for an investigation.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/16/nsa-linked-group-hacked/comment-page-2/#comment-1573114</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 04 Dec 2017 10:15:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45534#comment-1573114</guid>
		<description><![CDATA[Security
NSA employee pleads guilty after stolen classified data landed in Russian hands


NSA employee pleads guilty after stolen classified data landed in Russian hands
http://www.zdnet.com/article/former-nsa-staffer-pleads-guilty-after-classified-data-theft/
The classified data was later collected by Kaspersky software running on the staffer&#039;s home computer.

Eugene Kaspersky: We would quit Moscow if Russia asked us to spy
http://www.zdnet.com/article/eugene-kaspersky-we-would-quit-moscow-if-russia-asked-us-to-spy/

Kaspersky Lab founder hits back at espionage claims.]]></description>
		<content:encoded><![CDATA[<p>Security<br />
NSA employee pleads guilty after stolen classified data landed in Russian hands</p>
<p>NSA employee pleads guilty after stolen classified data landed in Russian hands<br />
<a href="http://www.zdnet.com/article/former-nsa-staffer-pleads-guilty-after-classified-data-theft/" rel="nofollow">http://www.zdnet.com/article/former-nsa-staffer-pleads-guilty-after-classified-data-theft/</a><br />
The classified data was later collected by Kaspersky software running on the staffer&#8217;s home computer.</p>
<p>Eugene Kaspersky: We would quit Moscow if Russia asked us to spy<br />
<a href="http://www.zdnet.com/article/eugene-kaspersky-we-would-quit-moscow-if-russia-asked-us-to-spy/" rel="nofollow">http://www.zdnet.com/article/eugene-kaspersky-we-would-quit-moscow-if-russia-asked-us-to-spy/</a></p>
<p>Kaspersky Lab founder hits back at espionage claims.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/16/nsa-linked-group-hacked/comment-page-2/#comment-1573113</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 04 Dec 2017 10:14:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45534#comment-1573113</guid>
		<description><![CDATA[The leaks have come to light as investigators scramble to trace the source of an even worse breach of N.S.A. security: the public release of the agency’s hacking tools by a still-unidentified group calling itself the Shadow Brokers. Some of those tools have been subsequently used for “ransomware” attacks that shut down or disrupted businesses, hospitals, railways and other enterprises around the world this year.]]></description>
		<content:encoded><![CDATA[<p>The leaks have come to light as investigators scramble to trace the source of an even worse breach of N.S.A. security: the public release of the agency’s hacking tools by a still-unidentified group calling itself the Shadow Brokers. Some of those tools have been subsequently used for “ransomware” attacks that shut down or disrupted businesses, hospitals, railways and other enterprises around the world this year.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/16/nsa-linked-group-hacked/comment-page-2/#comment-1573111</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 04 Dec 2017 10:13:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45534#comment-1573111</guid>
		<description><![CDATA[Former N.S.A. Employee Pleads Guilty to Taking Classified Information
https://www.nytimes.com/2017/12/01/us/politics/nsa-nghia-pho-classified-information-stolen-guilty.html?_r=0

BALTIMORE — A former National Security Agency employee admitted on Friday that he had illegally taken from the agency classified documents believed to have subsequently been stolen from his home computer by hackers working for Russian intelligence.

Nghia H. Pho, 67, of Ellicott City, Md., pleaded guilty to one count of willful retention of national defense information, an offense that carries a possible 10-year sentence. 

Mr. Pho, who worked as a software developer for the N.S.A., was born in Vietnam but is a naturalized United States citizen.

But in court documents, prosecutors did disclose that he worked from 2006 to 2016 for the N.S.A.’s “Tailored Access Operations.”]]></description>
		<content:encoded><![CDATA[<p>Former N.S.A. Employee Pleads Guilty to Taking Classified Information<br />
<a href="https://www.nytimes.com/2017/12/01/us/politics/nsa-nghia-pho-classified-information-stolen-guilty.html?_r=0" rel="nofollow">https://www.nytimes.com/2017/12/01/us/politics/nsa-nghia-pho-classified-information-stolen-guilty.html?_r=0</a></p>
<p>BALTIMORE — A former National Security Agency employee admitted on Friday that he had illegally taken from the agency classified documents believed to have subsequently been stolen from his home computer by hackers working for Russian intelligence.</p>
<p>Nghia H. Pho, 67, of Ellicott City, Md., pleaded guilty to one count of willful retention of national defense information, an offense that carries a possible 10-year sentence. </p>
<p>Mr. Pho, who worked as a software developer for the N.S.A., was born in Vietnam but is a naturalized United States citizen.</p>
<p>But in court documents, prosecutors did disclose that he worked from 2006 to 2016 for the N.S.A.’s “Tailored Access Operations.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/16/nsa-linked-group-hacked/comment-page-2/#comment-1572980</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 02 Dec 2017 19:10:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45534#comment-1572980</guid>
		<description><![CDATA[New York Times:
Former NSA employee Nghia H. Pho pleads guilty to taking classified files home, where, officials say, Russian hackers stole the files via Kaspersky software

Former N.S.A. Employee Pleads Guilty to Taking Classified Information
https://www.nytimes.com/2017/12/01/us/politics/nsa-nghia-pho-classified-information-stolen-guilty.html

A former National Security Agency employee admitted on Friday that he had illegally taken from the agency classified documents believed to have subsequently been stolen from his home computer by hackers working for Russian intelligence.

Nghia H. Pho, 67, of Ellicott City, Md., pleaded guilty to one count of willful retention of national defense information, an offense that carries a possible 10-year sentence. 

But in court documents, prosecutors did disclose that he worked from 2006 to 2016 for the N.S.A.’s “Tailored Access Operations.” The unit, whose name has now been changed to Computer Network Operations, is the N.S.A.’s fastest-growing component.

He kept those materials, some in digital form, at his home in Maryland, according to prosecutors.

Mr. Pho is one of three N.S.A. workers to be charged in the past two years with mishandling classified information, a dismal record for an agency that is responsible for some of the government’s most carefully guarded secrets.

Mr. Pho took the classified documents home to help him rewrite his resume. But he had installed on his home computer antivirus software made by Kaspersky Lab, a top Russian software company, and Russian hackers are believed to have exploited the software to steal the documents, the officials said.]]></description>
		<content:encoded><![CDATA[<p>New York Times:<br />
Former NSA employee Nghia H. Pho pleads guilty to taking classified files home, where, officials say, Russian hackers stole the files via Kaspersky software</p>
<p>Former N.S.A. Employee Pleads Guilty to Taking Classified Information<br />
<a href="https://www.nytimes.com/2017/12/01/us/politics/nsa-nghia-pho-classified-information-stolen-guilty.html" rel="nofollow">https://www.nytimes.com/2017/12/01/us/politics/nsa-nghia-pho-classified-information-stolen-guilty.html</a></p>
<p>A former National Security Agency employee admitted on Friday that he had illegally taken from the agency classified documents believed to have subsequently been stolen from his home computer by hackers working for Russian intelligence.</p>
<p>Nghia H. Pho, 67, of Ellicott City, Md., pleaded guilty to one count of willful retention of national defense information, an offense that carries a possible 10-year sentence. </p>
<p>But in court documents, prosecutors did disclose that he worked from 2006 to 2016 for the N.S.A.’s “Tailored Access Operations.” The unit, whose name has now been changed to Computer Network Operations, is the N.S.A.’s fastest-growing component.</p>
<p>He kept those materials, some in digital form, at his home in Maryland, according to prosecutors.</p>
<p>Mr. Pho is one of three N.S.A. workers to be charged in the past two years with mishandling classified information, a dismal record for an agency that is responsible for some of the government’s most carefully guarded secrets.</p>
<p>Mr. Pho took the classified documents home to help him rewrite his resume. But he had installed on his home computer antivirus software made by Kaspersky Lab, a top Russian software company, and Russian hackers are believed to have exploited the software to steal the documents, the officials said.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/16/nsa-linked-group-hacked/comment-page-2/#comment-1570821</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 16 Nov 2017 13:15:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45534#comment-1570821</guid>
		<description><![CDATA[Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them
Moscow-based AV provider challenges claims it helped Russian spies.
https://arstechnica.com/information-technology/2017/11/kaspersky-yes-we-obtained-nsa-secrets-no-we-didnt-help-steal-them/

For almost two months in 2014, servers belonging to Moscow-based Kaspersky Lab received confidential National Security Agency materials from a poorly secured computer located in the United States that stored the files, most likely in violation of US laws, company officials said.

The classified source code, documents, and executable binaries were stored on a computer that used an IP address reserved for Verizon FIOS customers in Baltimore, about 20 miles from the NSA&#039;s Fort Meade, Maryland, headquarters, Kaspersky Lab said in an investigation report it published early Thursday morning. Starting on September 11, 2014 and running until November 9 of that year, Kaspersky Lab servers downloaded the confidential files multiple times after the company&#039;s antivirus software, which was installed on the machine, found they contained malicious code from Equation Group, an NSA-linked hacking group that operated for at least 14 years before Kaspersky exposed it in 2015.

The downloads—which, like other AV software, the Kaspersky program automatically initiated when it encountered suspicious software that warranted further inspection—included a 45MB 7-Zip archive that contained source code, malicious executables, and four documents bearing US government classification markings. A company analyst who manually reviewed the archive quickly determined it contained confidential material. Within a few days and at the direction of CEO and founder Eugene Kaspersky, the company deleted all materials except for the malicious binaries. The company then created a special software tweak to prevent the 7-Zip file from being downloaded again.

&quot;The reason we deleted those files and will delete similar ones in the future is two-fold,&quot; Kaspersky Lab officials wrote in Thursday&#039;s report. &quot;We don’t need anything other than malware binaries to improve protection of our customers and secondly, because of concerns regarding the handling of potential classified materials. Assuming that the markings were real, such information cannot and will not [be] consumed even to produce detection signatures based on descriptions.&quot;]]></description>
		<content:encoded><![CDATA[<p>Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them<br />
Moscow-based AV provider challenges claims it helped Russian spies.<br />
<a href="https://arstechnica.com/information-technology/2017/11/kaspersky-yes-we-obtained-nsa-secrets-no-we-didnt-help-steal-them/" rel="nofollow">https://arstechnica.com/information-technology/2017/11/kaspersky-yes-we-obtained-nsa-secrets-no-we-didnt-help-steal-them/</a></p>
<p>For almost two months in 2014, servers belonging to Moscow-based Kaspersky Lab received confidential National Security Agency materials from a poorly secured computer located in the United States that stored the files, most likely in violation of US laws, company officials said.</p>
<p>The classified source code, documents, and executable binaries were stored on a computer that used an IP address reserved for Verizon FIOS customers in Baltimore, about 20 miles from the NSA&#8217;s Fort Meade, Maryland, headquarters, Kaspersky Lab said in an investigation report it published early Thursday morning. Starting on September 11, 2014 and running until November 9 of that year, Kaspersky Lab servers downloaded the confidential files multiple times after the company&#8217;s antivirus software, which was installed on the machine, found they contained malicious code from Equation Group, an NSA-linked hacking group that operated for at least 14 years before Kaspersky exposed it in 2015.</p>
<p>The downloads—which, like other AV software, the Kaspersky program automatically initiated when it encountered suspicious software that warranted further inspection—included a 45MB 7-Zip archive that contained source code, malicious executables, and four documents bearing US government classification markings. A company analyst who manually reviewed the archive quickly determined it contained confidential material. Within a few days and at the direction of CEO and founder Eugene Kaspersky, the company deleted all materials except for the malicious binaries. The company then created a special software tweak to prevent the 7-Zip file from being downloaded again.</p>
<p>&#8220;The reason we deleted those files and will delete similar ones in the future is two-fold,&#8221; Kaspersky Lab officials wrote in Thursday&#8217;s report. &#8220;We don’t need anything other than malware binaries to improve protection of our customers and secondly, because of concerns regarding the handling of potential classified materials. Assuming that the markings were real, such information cannot and will not [be] consumed even to produce detection signatures based on descriptions.&#8221;</p>
]]></content:encoded>
	</item>
</channel>
</rss>
