Home Security Russian Govt 'gained access to Kasperky AV source code'

Russian Govt 'gained access to Kasperky AV source code'

Russian Govt 'gained access to Kasperky AV source code' Featured

Russian government sources appear to have gained access to the source code of Kaspersky's anti-virus software, if a report that Moscow was using the program to look for classified US government documents is to be believed.

A report in The Wall Street Journal claimed that the program had been modified into a tool for espionage and used to search for terms like "top secret".

Well-known British security researcher Kevin Beaumont expressed scepticism about this claim, saying, "There's so much b***shit in the briefings being given to press. AV uploading every document with term "top secret" would fry networks."

Anti-virus programs are installed mostly on machines running Windows. They have access to the entire system and, during routine scans, often upload suspicious files to virus databases for further analysis.

The report appeared the same day that the German federal cyber agency BSI said it had no evidence to back an earlier claim by the same newspaper that Russian hackers had used Kaspersky software to spy on US authorities.

"The Federal Office for Security in Information Technology does not currently have any knowledge that the process took place as described in the media report. The BSI is in contact with the American partner authorities," the agency said in a statement.

"A warning from the BSI before the use of Kaspersky products is currently not provided, since the BSI has no evidence of a malfunction of the company or weak points in the software."

Wednesday's WSJ report quoted "a former US official with knowledge of information gleaned in 2015 about how the software was used to search for American secrets" as saying: "There is no way, based on what the software was doing, that Kaspersky couldn’t have known about this."

A report in The Washington Post on Tuesday claimed that Israeli government information security professionals had found NSA hacking tools in Kaspersky Lab's system when it gained access to the company's servers in 2014.

And The New York Times claimed that Russian Government employees had used Kaspersky's anti-virus software to search for the code names of US intelligence programmes, while Israeli intelligence officials looked on.

The spate of stories about Kaspersky Lab have come in the wake of claims that Russia influenced the direction of the US presidential election in 2016. These allegations have been mounting since Donald Trump defeated Hillary Clinton in November last year.

Some observers say Kaspersky Lab has become collateral damage in the stoush between the US and Russian Governments.


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.


Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.


Popular News