Archive for the ‘NSA’ Category

Kaspersky: NSA staffer’s laptop was infected with malware

Kaspersky Lab released details from an internal investigation on Wednesday, hours before a hearing in Congress on its antivirus technology.

Russian spies didn't need Kaspersky Lab's antivirus software to steal information from an NSA staffer, the company says -- the computer was already infected with malware.

Kaspersky Lab has been under scrutiny in the US after multiple reports alleged that the Moscow-based security company had been working with the Russian government for digital espionage. US officials have been on high alert for Russian cyberattacks and internet shenanigans, fearing national security threats to everything from the country's elections to its power grid.

Kaspersky's software had allegedly helped someone steal the NSA's hacking tools in 2015 and provide them to Russian spies,the Wall Street Journalfirst reported.

But an internal investigation by Kaspersky Lab suggests that the NSA staffer would have been hacked regardless of what antivirus program was on the computer. That's because malware had already slipped in.

The security company released preliminary details from its investigation on Wednesday, just hours ahead of a hearing before the House Committee on Science and Technology on the risks Kaspersky Lab might pose.

According to the investigation, the company said, the NSA staffer downloaded pirated software onto his personal laptop, including an illegal Microsoft Office activation key generator, on Oct. 4, 2014.

"The malware dropped from the trojanized keygen was a full blown backdoor which may have allowed third parties access to the user's machine," Kaspersky said in its report.

The NSA declined to comment for this story. The staffer had already broken procedure by bringing classified data onto his personal computer at home.

Kaspersky Lab said its antivirus technology would have been able to block the malware disguised as a key generator if the staffer hadn't disabled the software to allow the download. After the staffer turned his antivirus back on, it spotted the hidden malware, along with a stash of the NSA's hacking tools.

Antivirus software is designed to find malware, regardless of whether it's from a cybercriminal hiding it in pirated software or a government agency using it to hack nation states. That's why Kaspersky's software picked up the NSA's tools during its scans, the company said.

The NSA's malware had come from Equation Group, a hacking team within the government agency.

"Upon processing, the archive was found to contain multiple malware samples and source code for what appeared to be Equation malware," the company said.

An analyst alerted company CEO Eugene Kaspersky about picking up the NSA's tools, and Kaspersky asked that the archive be deleted. They said the program was not shared with any third parties.

It's still unclear how these tools then ended up with Russian spies, but Kaspersky Lab indicated that the malware hidden on the NSA's staffer's computer could have played a role. There have not been similar incidents in the three years since, according to the investigation.

The Smartest Stuff: Innovators are thinking up new ways to make you, and the things around you, smarter.

Security: Stay up-to-date on the latest in breaches, hacks, fixes and all those cybersecurity issues that keep you up at night.

Here is the original post:
Kaspersky: NSA staffer's laptop was infected with malware

Report: Hackers Stole NSA Cybertools In Another Breach Via …

The Wall Street Journal reports there has been a new breach at the National Security Agency via one of the agency's contractors. NSA Handout/Getty Images hide caption

The Wall Street Journal reports there has been a new breach at the National Security Agency via one of the agency's contractors.

Russian hackers stole top secret cybertools from a National Security Agency contractor in yet another embarrassing compromise for U.S. spy agencies, the Wall Street Journal reported Thursday.

The NSA contractor is believed to have taken highly sensitive official software home to a personal computer in 2015. His machine was running a Russian security program made by Kaspersky Labs, which can be exploited by Russia's intelligence agencies, the Journal reported.

The NSA declined to comment.

Members of Congress, however, slammed the spy agency for the latest in a series of breaches blamed not on its own employees but on the vendors it uses in place of or in addition to them.

At least three other contractors Reality Winner, Hal Martin and Edward Snowden also have been accused of hoarding or releasing NSA's secrets. An online entity called the "Shadow Brokers" also has tried to auction what it called software stolen from the NSA.

Nebraska's Republican Sen. Ben Sasse said he was tired of seeing the same headlines about failures of NSA's information security.

"The men and women of the U.S. intelligence community are patriots, but the NSA needs to get its head out of the sand and solve its contractor problem," Sasse said. "Russia is a clear adversary in cyberspace, and we can't afford these self-inflicted injuries."

Intelligence officials often stress that the NSA and its sibling agencies have a "layered" cyberdefense that is larger than any single tool or system. So the failure reported by the Journal might not amount to the loss of what intelligence workers might call "the keys to the kingdom."

Plus spy agency bosses have previously also said they would not run the Russian-made security software from Kaspersky Labs that the Journal said was associated with the loss of the hacking tools. In fact, Acting Homeland Security Secretary Elaine Duke said in September that she was banning the entire federal government from using Kaspersky.

Kaspersky Labs has millions of users around the world and is among NPR's corporate underwriters. It has denied that it is a cat's-paw for Russia's intelligence agencies or any other government.

New Hampshire Democratic Sen. Jeanne Shaheen said Thursday that the widespread use of Kaspersky software was no excuse for what she called the slow action by the U.S. intelligence community and the broader federal government.

"This development should serve as a stark warning, not just to the federal government but to states, local governments and the American public, of the serious dangers of using Kaspersky software," Shaheen said.

"The strong ties between Kaspersky Lab and the Kremlin are extremely alarming and have been well-documented for some time. It's astounding and deeply disturbing that the Russian government continues to have this tool at their disposal to harm the United States."

Follow this link:
Report: Hackers Stole NSA Cybertools In Another Breach Via ...

Russia reportedly stole NSA secrets with help of Kaspersky …

The Wall Street Journal just published an incendiary article that says hackers working for the Russian government stole confidential material from a National Security Agency contractor's home computer after identifying files though the contractor's use of antivirus software from Moscow-based Kaspersky Lab.

The report may well be true, but, for now, there's no way to independently confirm it. The report is based on unnamed people the publication says had knowledge of the matter, and it provides no evidence to support its claim. What's more, the lack of detail leaves open the possibility that, even if Kaspersky's AV did help Russia home in on the highly sensitive code and documents, the disclosure was the inadvertent result of a software bug, and no one from Kaspersky Lab cooperated with the attackers in any way. Also lost in the focus on Kaspersky Lab is the startling revelation that yet another NSA insider managed to sneak classified material outside of the NSA's network and put it on an unsecured computer. More of this analysis will follow.

First, here's a summary of what the WSJ reported.

The unnamed contractor removed the material from the NSA and stored it on a home computer that ran a version of Kaspersky AV. The material, according to the unnamed sources, included "details about how the NSA penetrates foreign computer networks, the computer code it uses for such spying, and how it defends networks inside the US." Sometime in 2015, the material was stolen by Russia-sponsored hackers who "appear to have targeted the contractor after identifying the files through the contractor's use" of the Kaspersky AV. The breach was discovered in the first three months of 2016.

The post continued:

US investigators believe the contractor's use of the software alerted Russian hackers to the presence of files that may have been taken from the NSA, according to people with knowledge of the investigation. Experts said the software, in searching for malicious code, may have found samples of it in the data the contractor removed from the NSA.

But how the antivirus system made that determination is unclear, such as whether Kaspersky technicians programed the software to look for specific parameters that indicated NSA material. Also unclear is whether Kaspersky employees alerted the Russian government to the finding.

Investigators did determine that, armed with the knowledge that Kaspersky's software provided of what files were suspected on the contractor's computer, hackers working for Russia homed in on the machine and obtained a large amount of information, according to the people familiar with the matter.

The report comes as concerns mount inside the US about Russian hacking in general and more specifically about whether Kaspersky Lab has ever, or might in the future, play a role in supporting such hacks. Rumors have swirled for years that, because of Kaspersky Labs' nationality and the early training founder Eugene Kaspersky received from the Russian government, the company was a Russian proxy that provided, or at least could provide when asked, that country's government with assistance in breaking into the computers of Russian adversaries.

As early as August, according to Cyber Scoop, the FBI quietly briefed private-sector companies on the threat it believed Kaspersky products and services posed. In early September, electronics retailer Best Buy stopped selling Kaspersky software and offered free removals and credits toward competing packages. Last month, the suspicions reached a new high when the US Department of Homeland Security took the unprecedented step of directing all US agencies to stop using Kaspersky products and services.

The US government has never provided hard evidence for the private briefings or the DHS directive. Dave Aitel, a former NSA hacker who is now CEO of penetration-testing firm Immunity, said the allegations aired on Thursday's WSJ post are a plausible explanation.

"That's exactly the kind of behavior that would cause the US government to do what they're doing," he told Ars. "There's only one really big thing, which is they think [Kaspersky] is operating as an agent for a foreign government, most likely wittingly."

The counter argument to what Aitel and plenty of people in security and national security circles are saying is that the extraordinary allegations are based solely on anonymous sources and aren't backed up with any hard evidence. What's more, the anonymous sources never say that anyone from Kaspersky Lab aided or cooperated with the hackers. The latter point leaves open the possibility that the hole left open by Kaspersky AV was unintentional by its developers and was exploited by Russian hackers without any help from the company.

In September 2015, Google Project Zero researcher Tavis Ormandy said his cursory examination of Kaspersky AV exposed multiple vulnerabilities that made it possible for attackers to remotely execute malicious code on computers that ran the software. If the hackers had knowledge the NSA contractor was using the Kaspersky AV, it's at least feasible they exploited those vulnerabilities or similar ones to identify the sensitive materials and possibly also steal them.

Kaspersky has since patched the vulnerabilities. Over the years, Ormandy has discovered equally severe code-execution vulnerabilities in AV software from a host of Kaspersky competitors.

The WSJ article tacitly suggests this alternate theory is not the case. It cites a former NSA hacker speculating that the names and fingerprints of the sensitive files were indexed in a scan performed by the Kaspersky software and then uploaded to the company's cloud environment so they can be compared against a master list of known malware. "You're basically surrendering your right to privacy by using Kaspersky software," the former NSA employee, Blake Darch, told the publication.

The unspoken implication is that, once the Kaspersky service indexed the NSA material, company officials privately notified Russian spies so they could target the contractor's computer. But a possible answer is that the Kaspersky network was compromised, allowing the attackers responsible to pin point the location of the files on the contractor's computer. After all, Kaspersky Lab has already disclosed that from mid 2014 to the first quarter of 2015, its network was compromised by highly sophisticated malware that has the hallmarks of nation-sponsored attackers. Aitel of Immunity, however, continued to agree with the theory Kaspersky knowingly aided Russia, although he admitted that at this point there's no public proof it's correct.

"It's not something where someone exploited Kaspersky software," he said. "If that's what it was, it wouldn't be in The Wall Street Journal." Referring to the term for tapping phone and Internet connections for information of interest, he added: "I don't think it was signals intelligence by the Russian government. They clearly got it from a Kaspersky machine. That seems a lot more likely."

The theory is made more plausible by the fact that, by 2015, Kaspersky Lab had detailed knowledge of some of the NSA's most elite hacking tools and methods. Company researchers had acquired this knowledge after doing exhaustive research into a group it dubbed the Equation Group. As Ars reported in February of that year, the hacking team was clearly tied to the NSAif not a part of itby its advanced access to zero-day exploits that would later be used in the Stuxnet worm that reportedly was developed jointly by the NSA and its counterparts in Israel.

In an e-mailed statement, Kaspersky officials wrote:

Kaspersky Lab has not been provided any evidence substantiating the company's involvement in the alleged incident reported by the Wall Street Journal on October 5, 2017, and it is unfortunate that news coverage of unproven claims continue to perpetuate accusations about the company.

As a private company, Kaspersky Lab does not have inappropriate ties to any government, including Russia, and the only conclusion seems to be that Kaspersky Lab is caught in the middle of a geopolitical fight.

We make no apologies for being aggressive in the battle against malware and cybercriminals. The company actively detects and mitigates malware infections, regardless of the source, and we have been proudly doing so for 20 years, which has led to continuous top ratings in independent malware detection tests. It's also important to note that Kaspersky Lab products adhere to the cybersecurity industry's strict standards and have similar levels of access and privileges to the systems they protect as any other popular security vendor in the US and around the world.

The takeaway is that, as the Kaspersky Lab statement notes, the WSJ's explosive allegations aren't substantiated with any evidence and, further, they're based on anonymous sources. That means, at the moment, there's no way journalists can independently verify the claims. What's more, the article as written leaves open the possibility that the role Kaspersky AV played in the breach was caused by the same sort of critical vulnerability found in virtually all AV software.

That said, if the allegations are true, they're sure to fuel the already growing concern of Russian hacking, which US intelligence agencies say has attempted to influence the US presidential election and widen political and cultural divides on social media. Additionally, if the allegations prove true, it's almost certainly the end of Kaspersky Lab as it has come to be known over the past decade.

What shouldn't go overlooked in Thursday's report is that this is the third known instance in the past four years of an NSA breach resulting from insider access to classified materials. The best known case is whistleblower Edward Snowden, who was able to trawl through NSA networks collecting documents for an extended period of time before turning them over to reporters. In 2016, a separate NSA contractor, Harold T. Martin III, was arrested after he sneaked 50 terabytes of confidential material out of the NSA and stored it at his home in Glen Burnie, Maryland. The trove comprises as much as 75 percent of the exploits belonging to the Tailored Access Operations, the elite hacking NSA unit that develops and deploys some of the world's most sophisticated software exploits.

In May, The New York Times reported that an NSA employee was arrested in 2015 on insider leak suspicions but was never identified. It's not immediately clear if this insider is different from the one mentioned in Thursday's WSJ article. In a report published after Ars went live with this post, The Washington Post said the person who took the NSA material and stored it on his home computer was an NSA employee who worked for the Tailored Access Operations and was in the process of developing tools to replace those considered compromised by the Snowden leaks. The Washington Post went on to say the insider was the same one who came under suspicion in 2015

Adding further urgency is the series of highly damaging leaks made over the past 14 months by a mysterious group calling itself the Shadow Brokers. The trove has included some of the NSA's most potent software exploits and documents detailing past attacks. Whether the leaked Shadow Brokers material was the result of an insider theft or a hack by outsiders remains unknown.

Thursday's report means that yet another trusted insider was able to sneak documents and code outside of the NSA and not only store them on an Internet-connected computer but also one that was running AV software. Whatever role Kaspersky Lab played in the hack, the series of breathtaking security blunders made by the NSA and its workers should remain front and center in this reporting.

Post updated to add Washington Post reporting.

More:
Russia reportedly stole NSA secrets with help of Kaspersky ...

Alleged NSA leaker wants court to throw out evidence – WSB Atlanta

by: Nicole CarrUpdated: Sep 7, 2017 - 10:15 PM

RICHMOND COUNTY, Ga. - The Georgia contractor indicted on charges she leaked Russian election intelligence info to the media is asking the court to throw out her interrogation statements.

Reality Winners defense filed a motion to suppress the evidence last week, claiming the contractor was restrained in her home prior to arrest, and not read her Miranda rights.

Winner, 25, is in jail and awaiting trial to face the charge of willful retention and transmission of national defense information. Shes accused of removing classified material from an Augusta government facility where she worked and mailing it to an online news outlet.

Winner pleaded not guilty in federal court in Augusta on June 6.

Earlier that day, Channel 2s Nicole Carr got an exclusive look inside the room where Winner was interrogated, after the womans parents invited the crew inside the home. They were concerned Winner had no chance at a fair trial due to the high-profile nature of the charges and widespread threats.

Channel 2 legal analyst Esther Panitch weighed in on the motion.

If shes more concerned about the court of public opinion, well then, shes probably lost that argument, Panitch said. If shes more concerned with what her punishment will be if shes convicted, or that shes convicted at all, this is the route she needs to take.

WINNERS SIDE OF THE STORY

For the first time, Winner explains what happened inside her home prior to her June 3arrest.Newly filed court documents indicate the woman was surrounded by nearly a dozen armed FBI agents during a raid at her house.

Winner explained that she returned home from the grocery store and was eventually asked to enter that 7 foot by 9 foot room in the back of her home. Winner says she told the armed agents it was creepy and weird and she did not like to go back there.

Winner goes on to say the interrogation continued with agents blocking the doorway.

According to the declaration she submitted to the court, at one point Winner explained the following:

I specifically told law enforcement that whatever we were using had already been compromised, and that this report was just going to be like a one drop in the bucket.

She was told she was the most likely candidate of the document leak, and this was her opportunity to tell the truth. At the same time, Winner says she was told by the agents that she likely just made a mistake, and she had a good career. If shed leak the document for a political reason, Winner said she was told by the agents that theyd feel better that they didnt have a real serious problem on their hands."

Winner would eventually be directed to stand in her front yard. She by two female agents who arrived after the interrogation, she said.

Her defense argued that even though Winner wasnt handcuffed during the interrogation, she was restrained by heavy presence of armed agents.

The governments burden is to prove the statement was voluntarily and knowingly given, and it wasnt coerced in any way, Panitch explained.

Panitch explained that prosecutors will argue Winner was in the comfort of her own home and free to leave or refuse to answer the questions, but the circumstances may make that a hard argument.

If youre surrounded by armed agents and theyre not going to let you walk around in your house alone because theyre executing a search warrant, do you really feel like youre able to leave? Panitch asked. I would challenge most people to try and get up and leave that situation and see how comfortable you would feel.

NEW TRIAL DATE

Theres no published timetable on when the court will hear the suppression motion in an evidentiary hearing.

Meanwhile, Winner was originally scheduled to begin trial in late October, but the court has granted the defense more time to review classified documents. Its a challenging task considering the number of security clearances the growing team is having to land in a limited time period.

The new trial date is set for March 19, and will set the stage for leaker tolerance under the Trump administration.

These are real issues that need to be dealt with and we will see the current administrations policies going forward, using this case as an example, Panitch said.

2017 Cox Media Group.

See the original post:
Alleged NSA leaker wants court to throw out evidence - WSB Atlanta

Three Contract Protests Lodged Against NSA! – Breaking Defense

NSA headquarters

WASHINGTON: The National Security Agency, which can go for ten years without a contract protest, currently faces three, slowing the agencys ability to issue new contracts.

We are sitting on three of them right now. Used to be you could go a decade without one, let alone sitting on three in one year,Charlie Stein, of the NSAs wonderfully named Maryland Procurement Office, told about 100 audience members at the INSA and AFCEA intelligence conference today.

For the companies involved, Stein did not sound terribly sympathetic and offered a fact that must elicit enormous envy from his colleagues in Defense Department acquisition. Ican say that we have not lost one yet, and we dont intend to.

So whats the cause of this sudden spate of protests, especially one involving an agency that normally works very closely and quietly with its contractors, often for a very long time?

Stein says they now have a junior workforce, one that isnt as adept at crossing every T and dotting every i. Combine that with fact that, as a result of the protests, their attorneys are tied up dealing with protests so they dont have time to make sure new deals are free of protestable issues.

Al Munson, first head of acquisition for the Director of National Intelligence, who appeared on the panel with Stein, notes in a recent paper for the Potomac Institute that bid protests were extremely rare, and success in causing a source selection decision to be overturned were even much rarer in the past. This has multiple effects on intelligence acquisition.

Munson writes that the government has reduced the periods within the competitive process wherein communication with potential competitors can occur and has reduced the quality of those communications. This has the effect of reducing the clarity and increasing the ambiguity in the bidders understanding of the governments needs, and therefore, in the responsiveness of the bids to those needs. Munson believes this can lead to an overly optimistic (read: unrealistic) cost proposal. And once a protest is lodged, a program can be delayed years while the issues are resolved.

We wont mention the Air Forces tanker fiasco, but you can read about it here.

Link:
Three Contract Protests Lodged Against NSA! - Breaking Defense