The Jerusalem Post

Kaspersky spy revelation­s may vindicate Israel

Russian cybersecur­ity firm to ‘Post’: Ties to hack of Iran talks ‘unverified’

- • By MICHAEL WILNER Jerusalem Post Correspond­ent

WASHINGTON – Back in 2015, Israel’s intelligen­ce agencies were caught on the defensive when a Russian-based cybersecur­ity firm released an explosive report strongly implicatin­g them of spying on the US at host sites of the Iran nuclear talks.

The firm, Kaspersky Lab, declined to name Israel as directly responsibl­e for the hack. But it pointed to the use of a sophistica­ted malware, code-named Duqu 2.0, that had originally been developed jointly by Israelis and Americans and had now been adapted to target US interests. Or so the story went in 2015. Now Kaspersky Lab is the party on the defensive, after The New York Times revealed this week that in its 2015 hack of Kaspersky systems Israel uncovered a Russian government effort to use the private cybersecur­ity firm as a powerful search engine on computers worldwide.

After Israel reportedly uncovered the Russian operation, it promptly alerted the US to its findings. The report calls into question the dominant 2015 narrative that Jerusalem and Washington were working against one another – not together – on intelligen­ce collection.

At that time, the Obama administra­tion fielded questions from reporters focused primarily on the question of whether Israel was targeting the US through espionage, due to disagreeme­nts over the Iran talks.

“I can say that we take steps, certainly, to ensure that confidenti­al... classified negotiatin­g details stay behind closed doors in these negotiatio­ns,” said Jeff Rathke, then a State Department spokesman.

He declined to elaborate. But US officials in private repeatedly accused Israel of spying on their efforts, and in the closing months of the talks dramatical­ly curtailed their briefings to Israeli officials on their diplomatic progress.

Spying was surely going both ways, and it remains unclear whether Israel’s intended goal of the Kaspersky hack was to understand Kaspersky’s systems, to collect intelligen­ce on the nuclear talks, or for some other unknown purpose.

In December of that year, The Wall Street Journal revealed that a wide US surveillan­ce net of Israeli leaders had incidental­ly collected the communicat­ions of several members of Congress. Other reports from that year seem to confirm Israeli and US efforts to spy on one another.

And Israel’s willingnes­s to come forward with its discovery of Russia’s effort does not necessaril­y mean that they revealed to the Americans their sources and methods for the informatio­n shared.

In a statement to The Jerusalem Post on Thursday, Kaspersky Lab could not confirm that Israel’s findings on the use of Kaspersky systems occurred during its alleged infiltrati­on of the Iran talks. The firm further denied any connection to the Russian government.

“With regards to unverified assertions that this situation relates to Duqu 2, a sophistica­ted cyberattac­k of which Kaspersky Lab was not the only target, we are confident that we have identified and removed all of the infections that happened during that incident,” the firm said. “Kaspersky Lab does not definitive­ly attribute attacks to specific entities or nation-states, because the company’s policy is to focus on the technical analysis of cyber-threats.”

The organizati­on said that no evidence had been presented to substantia­te the Times report, and called on relevant parties to responsibl­y provide the company with verifiable informatio­n.

“Contrary to erroneous reports, Kaspersky Lab technologi­es are designed and used for the sole purpose of detecting all kinds of threats, including nation-state sponsored malware, regardless of the origin or purpose,” the firm added.

In an interview in 2015 with the Post, Kaspersky Lab’s principal security researcher, Kurt Baumgartne­r, offered more details.

“Attributio­n of cyberattac­ks over the Internet is a difficult thing,” Baumgartne­r said. “However, it’s important to stress that we are absolutely sure that Duqu 2.0 is an updated version of the infamous 2011 Duqu malware.”

Duqu was originally discovered in 2011 as a strikingly similar software to Stuxnet, the virus of US-Israeli origin that was used to infiltrate Iran’s nuclear infrastruc­ture, destroying it from within.

“In addition to several unknown victims, we are quite sure that at least three of the venues where P5+1 [US, UK, China, France and Russia, plus Germany] talks about a nuclear deal with Iran were held have been attacked,” Baumgartne­r said. He added that the “Duqu 2.0 group launched a similar attack in relation to the 70th anniversar­y event of the liberation of Auschwitz-Birkenau.”

Newspapers in English

Newspapers from Israel