Los Angeles Times

Israel found hacking tools of NSA at firm

Spies tipped off U.S. about their find in Kaspersky network.

- By Ellen Nakashima Nakashima writes for the Washington Post.

In 2015, Israeli government hackers saw something suspicious in the computers of a Moscow cybersecur­ity firm: hacking tools that could only have come from the National Security Agency.

Israel notified the NSA, where alarmed officials immediatel­y began a hunt for the breach, according to people familiar with the matter, who said an investigat­ion by the agency revealed that the tools were in the possession of the Russian government.

Israeli spies had found the hacking material on the network of Kaspersky Lab, the global antivirus firm, now under a spotlight in the U.S. because of suspicions that its products facilitate Russian espionage.

Last month, the Department of Homeland Security instructed federal civilian agencies to identify Kaspersky Lab software on their networks and remove it, on the grounds that “the Russian government, whether acting on its own or in collaborat­ion with Kaspersky, could capitalize on access provided by Kaspersky products to compromise federal informatio­n and informatio­n systems.”

The directive followed a decision by the General Services Administra­tion to remove Kaspersky from its list of approved vendors. And lawmakers on Capitol Hill are considerin­g a government-wide ban.

The NSA declined to comment on the Israeli discovery, which was first reported by the New York Times.

Kaspersky spokeswoma­n Sarah Kitsos said that “as a private company, Kaspersky Lab does not have inappropri­ate ties to any government, including Russia, and the only conclusion seems to be that Kaspersky Lab is caught in the middle of a geopolitic­al fight.”

She said the company “does not possess any knowledge” of Israel’s hack.

The firm’s founder, Eugene Kaspersky, said in a blog post last week that his antivirus software is supposed to find malware from all quarters.

“We absolutely and aggressive­ly detect and clean malware infections no matter the source,” he wrote, suggesting that the NSA hacking tools could have been picked up as malware by the antivirus program.

In the 2015 case, investigat­ors at the NSA examining how the Russians obtained the material eventually narrowed their search to an employee in the agency’s elite Tailored Access Operations division — hackers who collect intelligen­ce about foreign targets. The employee was using Kaspersky antivirus software on his home computer, according to the people familiar with the matter.

The employee, whose name has not been made public and who is still under investigat­ion by U.S. prosecutor­s, did not intend to pass the material to a foreign adversary.

“There wasn’t any malice,” said one person familiar with the case, who, like others, requested anonymity to discuss an ongoing case. “It’s just that he was trying to complete the mission, and he needed the tools to do it.”

Concerns about Kaspersky have also emerged in the cybersecur­ity industry Some officials say the firm’s software has been used not just to protect its customers’ computers but also as a platform for espionage.

Over the last several years, Kaspersky has on occasion used a standard industry technique that detects computer viruses but can also be employed to identify informatio­n and other data not related to malware, according to two industry officials, who spoke on condition of anonymity to discuss sensitive informatio­n.

The tool is called “silent signatures” — strings of digital code that operate in stealth mode to find malware but that could also be written to search computers for potential classified documents, using key words or acronyms.

“Silent detection is a widely adopted cybersecur­ity industry practice, used to verify malware detections and minimize false positives,” Kitsos said. “It enables cybersecur­ity vendors to offer the most up-to-date protection without bothering users with constant on-screen alerts.”

Kaspersky is also the only major antivirus firm whose data are routed through Russian internet service providers subject to Russian surveillan­ce. That surveillan­ce system is known as the System of Operative Investigat­ive Measures, or SORM.

Kitsos said customer data flowing through its Russian servers are encrypted. She said Kaspersky does not decrypt the data for the government.

Andrei Soldatov, a Russian surveillan­ce expert and author of “The Red Web,” said, “I would be very, very skeptical” of the claim that the government cannot read the firm’s data. As an entity that deals with encrypted informatio­n, Kaspersky must obtain a license from the FSB, Russia’s powerful security service, he noted, which “means your company is completely transparen­t” to the FSB.

It is not publicly known how the Russians obtained the NSA hacking tools in 2015. Some informatio­n security analysts have speculated that the Russians exploited a flaw in Kaspersky software. But other experts say the Russians would not need to hack Kaspersky’s systems. They say the material could be picked up through the country’s surveillan­ce regime.

The firm itself is likely to be beholden to the Kremlin, said Steven Hall, who ran the CIA’s Russia operations for 30 years. He said Kaspersky’s line of work is of particular interest to Russian President Vladimir Putin and because of the way things work in Russia, Eugene Kaspersky “knows he’s at the mercy of Putin.”

“The case against Kaspersky Lab is overwhelmi­ng,” said Sen. Jeanne Shaheen (D-N.H.), a vocal critic of Kaspersky who has pushed to remove the company’s software from federal networks. “The strong ties between Kaspersky Lab and the Kremlin are very alarming.”

The federal government increasing­ly has been conveying its concerns about Kaspersky to the private sector. Over at least the last two years, the FBI has notified major companies, including in the energy and financial sectors, about the risks of using Kaspersky software. The briefings have elaborated on the risks of espionage, sabotage and supply-chain attacks that could be enabled through use of the software. They also explained the surveillan­ce law that enables the Russian government to see data coursing through its domestic pipes.

“That’s the crux of the matter,” said one industry official who received the briefing. “Whether Kaspersky is working directly for the Russian government or not doesn’t matter — their internet service providers are subject to monitoring. So virtually anything shared with Kaspersky could become the property of the Russian government.”

Late last month, the National Intelligen­ce Council completed a classified report that it shared with NATO allies concluding that the FSB had “probable access” to Kaspersky customer databases and source code. That access, it concluded, could help enable cyberattac­ks against U.S. government, commercial and industrial control networks.

 ?? Pavel Golovkin Associated Press ?? KASPERSKY LAB, based in Moscow, has drawn suspicions that its products facilitate Russian espionage.
Pavel Golovkin Associated Press KASPERSKY LAB, based in Moscow, has drawn suspicions that its products facilitate Russian espionage.

Newspapers in English

Newspapers from United States