1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

News Kaspersky offers timeline for NSA document breach

Discussion in 'Article Discussion' started by bit-tech, 26 Oct 2017.

  1. bit-tech

    bit-tech Supreme Overlord Lover of bit-tech Administrator

    Joined:
    12 Mar 2001
    Posts:
    3,676
    Likes Received:
    138
    Read more
     
  2. jb0

    jb0 Minimodder

    Joined:
    8 Apr 2012
    Posts:
    555
    Likes Received:
    93
    Moral of the story: If you are developing malware and don't want it sent to the antivirus lab for analysis, you should PROBABLY disable the "send malware samples back for analysis" option.
     
  3. Corky42

    Corky42 Where's walle?

    Joined:
    30 Oct 2012
    Posts:
    9,648
    Likes Received:
    388
    Why would you as a CEO order the immediate deletion of the source code?
     
  4. edzieba

    edzieba Virtual Realist

    Joined:
    14 Jan 2009
    Posts:
    3,909
    Likes Received:
    591
    As pretty much everyone in the security industry expected all along.
    Because it comes under "**** we do NOT want to deal with", and as evidenced by the news flurry they weren't fast enough.
     
  5. pbryanw

    pbryanw Minimodder

    Joined:
    22 Jul 2009
    Posts:
    192
    Likes Received:
    4
    Other moral of the story - If you're contracted by the NSA, and have access to sensitive information, don't use keygen apps to try and pirate software. WTF!
     
  6. edzieba

    edzieba Virtual Realist

    Joined:
    14 Jan 2009
    Posts:
    3,909
    Likes Received:
    591
    And more importantly: don't download yet-to-be-deployed malware toolkits and their documentation onto your home machine!
     
  7. lacuna

    lacuna Minimodder

    Joined:
    9 Aug 2004
    Posts:
    687
    Likes Received:
    18
    I wonder where this ranks on a scale of 'fired' to 'Snowden'?
     
  8. jb0

    jb0 Minimodder

    Joined:
    8 Apr 2012
    Posts:
    555
    Likes Received:
    93
    Definitely. That was a hilarious WTF in there.
     
  9. dream caster

    dream caster just lurking from out there

    Joined:
    1 Jan 2002
    Posts:
    195
    Likes Received:
    1
    Expect many of those people working in IT security and in National Security bodies be like this: lone wolfs believing they can do many risky actions and nothing happens or being totally unaware of risks.
    Some links:
    https://www.wired.com/2012/07/ff_kaspersky/
    https://www.kaspersky.com/blog/internal-investigation-preliminary-results/19894/
    https://www.theregister.co.uk/2017/10/25/kaspersky_nsa_keygen_backdoor_office/

    These stories tell Karspersky happened to expose some NSA operations hacking nuclear plants in Iran, when he analyzed some nasty virus that really were NSA cyber-weapons, some years ago. They also tell how how near is he to Putin's government and how he failed to acknowledge some cyber attacks to Putin's opponents.

    It is told there Symantec didn't have those double standards.
     
    Last edited: 29 Oct 2017
Tags: Add Tags

Share This Page