Russia reportedly stole NSA secrets with help of Kaspersky …
The Wall Street Journal just published an incendiary article that says hackers working for the Russian government stole confidential material from a National Security Agency contractor's home computer after identifying files though the contractor's use of antivirus software from Moscow-based Kaspersky Lab.
The report may well be true, but, for now, there's no way to independently confirm it. The report is based on unnamed people the publication says had knowledge of the matter, and it provides no evidence to support its claim. What's more, the lack of detail leaves open the possibility that, even if Kaspersky's AV did help Russia home in on the highly sensitive code and documents, the disclosure was the inadvertent result of a software bug, and no one from Kaspersky Lab cooperated with the attackers in any way. Also lost in the focus on Kaspersky Lab is the startling revelation that yet another NSA insider managed to sneak classified material outside of the NSA's network and put it on an unsecured computer. More of this analysis will follow.
First, here's a summary of what the WSJ reported.
The unnamed contractor removed the material from the NSA and stored it on a home computer that ran a version of Kaspersky AV. The material, according to the unnamed sources, included "details about how the NSA penetrates foreign computer networks, the computer code it uses for such spying, and how it defends networks inside the US." Sometime in 2015, the material was stolen by Russia-sponsored hackers who "appear to have targeted the contractor after identifying the files through the contractor's use" of the Kaspersky AV. The breach was discovered in the first three months of 2016.
The post continued:
US investigators believe the contractor's use of the software alerted Russian hackers to the presence of files that may have been taken from the NSA, according to people with knowledge of the investigation. Experts said the software, in searching for malicious code, may have found samples of it in the data the contractor removed from the NSA.
But how the antivirus system made that determination is unclear, such as whether Kaspersky technicians programed the software to look for specific parameters that indicated NSA material. Also unclear is whether Kaspersky employees alerted the Russian government to the finding.
Investigators did determine that, armed with the knowledge that Kaspersky's software provided of what files were suspected on the contractor's computer, hackers working for Russia homed in on the machine and obtained a large amount of information, according to the people familiar with the matter.
The report comes as concerns mount inside the US about Russian hacking in general and more specifically about whether Kaspersky Lab has ever, or might in the future, play a role in supporting such hacks. Rumors have swirled for years that, because of Kaspersky Labs' nationality and the early training founder Eugene Kaspersky received from the Russian government, the company was a Russian proxy that provided, or at least could provide when asked, that country's government with assistance in breaking into the computers of Russian adversaries.
As early as August, according to Cyber Scoop, the FBI quietly briefed private-sector companies on the threat it believed Kaspersky products and services posed. In early September, electronics retailer Best Buy stopped selling Kaspersky software and offered free removals and credits toward competing packages. Last month, the suspicions reached a new high when the US Department of Homeland Security took the unprecedented step of directing all US agencies to stop using Kaspersky products and services.
The US government has never provided hard evidence for the private briefings or the DHS directive. Dave Aitel, a former NSA hacker who is now CEO of penetration-testing firm Immunity, said the allegations aired on Thursday's WSJ post are a plausible explanation.
"That's exactly the kind of behavior that would cause the US government to do what they're doing," he told Ars. "There's only one really big thing, which is they think [Kaspersky] is operating as an agent for a foreign government, most likely wittingly."
The counter argument to what Aitel and plenty of people in security and national security circles are saying is that the extraordinary allegations are based solely on anonymous sources and aren't backed up with any hard evidence. What's more, the anonymous sources never say that anyone from Kaspersky Lab aided or cooperated with the hackers. The latter point leaves open the possibility that the hole left open by Kaspersky AV was unintentional by its developers and was exploited by Russian hackers without any help from the company.
In September 2015, Google Project Zero researcher Tavis Ormandy said his cursory examination of Kaspersky AV exposed multiple vulnerabilities that made it possible for attackers to remotely execute malicious code on computers that ran the software. If the hackers had knowledge the NSA contractor was using the Kaspersky AV, it's at least feasible they exploited those vulnerabilities or similar ones to identify the sensitive materials and possibly also steal them.
Kaspersky has since patched the vulnerabilities. Over the years, Ormandy has discovered equally severe code-execution vulnerabilities in AV software from a host of Kaspersky competitors.
The WSJ article tacitly suggests this alternate theory is not the case. It cites a former NSA hacker speculating that the names and fingerprints of the sensitive files were indexed in a scan performed by the Kaspersky software and then uploaded to the company's cloud environment so they can be compared against a master list of known malware. "You're basically surrendering your right to privacy by using Kaspersky software," the former NSA employee, Blake Darch, told the publication.
The unspoken implication is that, once the Kaspersky service indexed the NSA material, company officials privately notified Russian spies so they could target the contractor's computer. But a possible answer is that the Kaspersky network was compromised, allowing the attackers responsible to pin point the location of the files on the contractor's computer. After all, Kaspersky Lab has already disclosed that from mid 2014 to the first quarter of 2015, its network was compromised by highly sophisticated malware that has the hallmarks of nation-sponsored attackers. Aitel of Immunity, however, continued to agree with the theory Kaspersky knowingly aided Russia, although he admitted that at this point there's no public proof it's correct.
"It's not something where someone exploited Kaspersky software," he said. "If that's what it was, it wouldn't be in The Wall Street Journal." Referring to the term for tapping phone and Internet connections for information of interest, he added: "I don't think it was signals intelligence by the Russian government. They clearly got it from a Kaspersky machine. That seems a lot more likely."
The theory is made more plausible by the fact that, by 2015, Kaspersky Lab had detailed knowledge of some of the NSA's most elite hacking tools and methods. Company researchers had acquired this knowledge after doing exhaustive research into a group it dubbed the Equation Group. As Ars reported in February of that year, the hacking team was clearly tied to the NSAif not a part of itby its advanced access to zero-day exploits that would later be used in the Stuxnet worm that reportedly was developed jointly by the NSA and its counterparts in Israel.
In an e-mailed statement, Kaspersky officials wrote:
Kaspersky Lab has not been provided any evidence substantiating the company's involvement in the alleged incident reported by the Wall Street Journal on October 5, 2017, and it is unfortunate that news coverage of unproven claims continue to perpetuate accusations about the company.
As a private company, Kaspersky Lab does not have inappropriate ties to any government, including Russia, and the only conclusion seems to be that Kaspersky Lab is caught in the middle of a geopolitical fight.
We make no apologies for being aggressive in the battle against malware and cybercriminals. The company actively detects and mitigates malware infections, regardless of the source, and we have been proudly doing so for 20 years, which has led to continuous top ratings in independent malware detection tests. It's also important to note that Kaspersky Lab products adhere to the cybersecurity industry's strict standards and have similar levels of access and privileges to the systems they protect as any other popular security vendor in the US and around the world.
The takeaway is that, as the Kaspersky Lab statement notes, the WSJ's explosive allegations aren't substantiated with any evidence and, further, they're based on anonymous sources. That means, at the moment, there's no way journalists can independently verify the claims. What's more, the article as written leaves open the possibility that the role Kaspersky AV played in the breach was caused by the same sort of critical vulnerability found in virtually all AV software.
That said, if the allegations are true, they're sure to fuel the already growing concern of Russian hacking, which US intelligence agencies say has attempted to influence the US presidential election and widen political and cultural divides on social media. Additionally, if the allegations prove true, it's almost certainly the end of Kaspersky Lab as it has come to be known over the past decade.
What shouldn't go overlooked in Thursday's report is that this is the third known instance in the past four years of an NSA breach resulting from insider access to classified materials. The best known case is whistleblower Edward Snowden, who was able to trawl through NSA networks collecting documents for an extended period of time before turning them over to reporters. In 2016, a separate NSA contractor, Harold T. Martin III, was arrested after he sneaked 50 terabytes of confidential material out of the NSA and stored it at his home in Glen Burnie, Maryland. The trove comprises as much as 75 percent of the exploits belonging to the Tailored Access Operations, the elite hacking NSA unit that develops and deploys some of the world's most sophisticated software exploits.
In May, The New York Times reported that an NSA employee was arrested in 2015 on insider leak suspicions but was never identified. It's not immediately clear if this insider is different from the one mentioned in Thursday's WSJ article. In a report published after Ars went live with this post, The Washington Post said the person who took the NSA material and stored it on his home computer was an NSA employee who worked for the Tailored Access Operations and was in the process of developing tools to replace those considered compromised by the Snowden leaks. The Washington Post went on to say the insider was the same one who came under suspicion in 2015
Adding further urgency is the series of highly damaging leaks made over the past 14 months by a mysterious group calling itself the Shadow Brokers. The trove has included some of the NSA's most potent software exploits and documents detailing past attacks. Whether the leaked Shadow Brokers material was the result of an insider theft or a hack by outsiders remains unknown.
Thursday's report means that yet another trusted insider was able to sneak documents and code outside of the NSA and not only store them on an Internet-connected computer but also one that was running AV software. Whatever role Kaspersky Lab played in the hack, the series of breathtaking security blunders made by the NSA and its workers should remain front and center in this reporting.
Post updated to add Washington Post reporting.
More:
Russia reportedly stole NSA secrets with help of Kaspersky ...
- How the heartbreaking lack of a confirmed leader is impacting CYBERCOM and NSA - Breaking Defense - November 7th, 2025 [November 7th, 2025]
- Goa invokes NSA for three months to tackle anti-socials - The Times of India - November 7th, 2025 [November 7th, 2025]
- CISA, NSA and other unveil security blueprint to harden Microsoft Exchange servers - Homeland Preparedness News - November 7th, 2025 [November 7th, 2025]
- NSA Shares Q3 Revenue Results Below Expectations - GuruFocus - November 7th, 2025 [November 7th, 2025]
- Filipinos aware of civilian supremacy over military NSA Ao - Philippine News Agency - October 28th, 2025 [October 28th, 2025]
- Sonam Wangchuk says his words were twisted to justify his NSA detention - The Statesman - October 26th, 2025 [October 26th, 2025]
- Nokia and stc pioneer the first commercial 5G NSA Cloud RAN deployment in the MEA region - ZAWYA - October 26th, 2025 [October 26th, 2025]
- China accuses NSA of multi-year hack targeting its national time systems - Nextgov/FCW - October 23rd, 2025 [October 23rd, 2025]
- Cybersecurity News: AWS outage, NSA hacking accusations, High risk WhatsApp automation - CISO Series - October 23rd, 2025 [October 23rd, 2025]
- Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials - Homeland Security Today - October 23rd, 2025 [October 23rd, 2025]
- AWS outage, NSA hacking accusations, High risk WhatsApp automation - LinkedIn - October 23rd, 2025 [October 23rd, 2025]
- Palestinian President Mahmoud Abbas: No Concessions Were Made In The Oslo Accords 1.85 Million Palestinians Returned To Their Homeland;... - October 23rd, 2025 [October 23rd, 2025]
- NSA to partner JKG to drive sports technology through Artificial Intelligence - GhanaWeb - October 23rd, 2025 [October 23rd, 2025]
- China claims NSA hacked its national timing systems using 42 "special cyber weapons" - TechSpot - October 23rd, 2025 [October 23rd, 2025]
- US NSA alleged to have launched a cyber attack on a Chinese agency - csoonline.com - October 21st, 2025 [October 21st, 2025]
- Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials - 404 Media - October 21st, 2025 [October 21st, 2025]
- China says it has foiled a series U.S. cyberattacks on its critical infrastructure Ministry of State Security says it has 'irrefutable evidence' NSA... - October 21st, 2025 [October 21st, 2025]
- China claims the NSA conducted cyberattacks on its national time center - Engadget - October 21st, 2025 [October 21st, 2025]
- China claims the US NSA conducted cyberattacks on its national time center - TechRadar - October 21st, 2025 [October 21st, 2025]
- Donald Trump's ex-NSA John Bolton indicted; charged over mishandling classified information; Trump calls - Times of India - October 19th, 2025 [October 19th, 2025]
- Trump critic and former NSA adviser John Bolton indicted on classified documents charges - MLive.com - October 19th, 2025 [October 19th, 2025]
- NSA Accused of Stealing Secrets from Chinas National Time Centre - Modern Diplomacy - October 19th, 2025 [October 19th, 2025]
- Ex-Donald Trump NSA John Bolton Indicted: All About The 18 Charges - NDTV - October 19th, 2025 [October 19th, 2025]
- Explained: What are the charges against ex-US NSA John Bolton? What next? - Firstpost - October 19th, 2025 [October 19th, 2025]
- Former Trump NSA John Bolton Indicted On 18 Counts For Sharing Classified Information - Republic World - October 19th, 2025 [October 19th, 2025]
- Ex-Trump NSA Bolton charged with storing, sharing classified information - Business Standard - October 17th, 2025 [October 17th, 2025]
- Lt. Gen. William Hartman, acting leader of NSA and Cyber Command, will not be nominated for the dual-hat role - POLITICO Pro - October 17th, 2025 [October 17th, 2025]
- Shaping health futures together: NSA engagement for EPW2 and Ageing is Living - World Health Organization (WHO) - October 17th, 2025 [October 17th, 2025]
- Trump's ex-NSA John Bolton indicted over sharing US defence secrets: Was his email hacked by Iran? - WION - October 17th, 2025 [October 17th, 2025]
- John Bolton Indicted: What are the Charges Against Trump's Former NSA? - Times Now - October 17th, 2025 [October 17th, 2025]
- China infrastructure hacks are 'unrestricted warfare' against America, former NSA director says - Washington Times - October 15th, 2025 [October 15th, 2025]
- Children were scared to sleep outside, many stopped going to schools: Why NSA was invoked against a rape accused in UPs Bhadohi - The Indian Express - October 15th, 2025 [October 15th, 2025]
- Chinas Capacity to Hack the U.S. Is Growing, Former NSA and Retired Gen. Tim Haugh Warns - Homeland Security Today - October 15th, 2025 [October 15th, 2025]
- Ousted NSA head Gen. Tim Haugh on his firing by the Trump administration - CBS News - October 13th, 2025 [October 13th, 2025]
- China's capacity to hack the U.S. is growing, former NSA head says. Here's what they're targeting and why. - CBS News - October 13th, 2025 [October 13th, 2025]
- China is hacking America's critical infrastructure, former NSA and retired Gen. Tim Haugh warns - CBS News - October 13th, 2025 [October 13th, 2025]
- John Bolton, Former US NSA And Trump Critic, May Face Federal Charges Soon: Report - News18 - October 13th, 2025 [October 13th, 2025]
- Acting US Cyber Command, NSA chief wont be nominated for the job, sources say - The Record from Recorded Future News - October 11th, 2025 [October 11th, 2025]
- Exclusive: DOJ seeking criminal charges against Trump's former NSA John Bolton - Yahoo - October 11th, 2025 [October 11th, 2025]
- NSA boss explains how revenue from Ghana-Mali game will be shared - GhanaWeb - October 11th, 2025 [October 11th, 2025]
- NSA rolls out digital skills, military training and smart reforms - GBC Ghana Online - October 9th, 2025 [October 9th, 2025]
- Overheated Solar Panel Batteries Caused Fire at NSA Chiefs Residence - liberianobserver.com - October 9th, 2025 [October 9th, 2025]
- NSA Doval meets Brazilian counterpart to review cooperation in strategic areas | Latest News India - Hindustan Times - October 4th, 2025 [October 4th, 2025]
- Red Hat allegedly hit by huge breach exposing major organizations, including the NSA - Cybernews - October 2nd, 2025 [October 2nd, 2025]
- NSA officer injured after Maryland man drives through checkpoint, rams multiple police vehicles - WMAR 2 News Baltimore - September 30th, 2025 [September 30th, 2025]
- Why should officials not be fined: HC on illegal NSA arrest - The Times of India - September 30th, 2025 [September 30th, 2025]
- SKM demands to release Sonam Wangchuk, revoke imposition of NSA - The Times of India - September 30th, 2025 [September 30th, 2025]
- Seoul's NSA reportedly says S.Korea unable to pay $350b upfront in investment in US for tariff deal; weaponizing alliance exposes nature of US... - September 30th, 2025 [September 30th, 2025]
- 'Delhi banega Khalistan': Freed Khalistani terrorist out on bail in Canada threatens India, targets NSA A - The Times of India - September 30th, 2025 [September 30th, 2025]
- Two Days After His Detention Under NSA, Sonam Wangchuks Wife Says She Is Yet to Speak to Him - The Wire India - September 30th, 2025 [September 30th, 2025]
- Sonam Wangchuk detained under NSA: What to know about National Security Act - The Indian Express - September 28th, 2025 [September 28th, 2025]
- Evercore ISI Raises PT on National Storage Affiliates Trust (NSA) to $32, Maintains an Underperform Rating - Yahoo Finance - September 28th, 2025 [September 28th, 2025]
- Sonam Wangchuk Arrested under NSA: Ladakh admin explains why he was moved to Jodhpur jail - Mint - September 28th, 2025 [September 28th, 2025]
- NSA whistleblower Reality Winner on rebuilding her life in new memoir - MSN - September 21st, 2025 [September 21st, 2025]
- Assessing the Valuation of National Storage Affiliates Trust (NSA) After Recent Share Price Moves - simplywall.st - September 19th, 2025 [September 19th, 2025]
- NSA Warns iPhone And Android UsersClose All Apps If You See This - Forbes - September 17th, 2025 [September 17th, 2025]
- US' Ex-NSA John Bolton: Trump Should Call Modi, Fix Relations, And Visit India For QUAD Summit' - Times of India - September 17th, 2025 [September 17th, 2025]
- 'Come To India': Ex-NSA's Words Of Wisdom To Trump On Tariff, Indo-US Ties - Times of India - September 17th, 2025 [September 17th, 2025]
- Video NSA whistleblower Reality Winner on rebuilding her life in new memoir - ABC News - September 17th, 2025 [September 17th, 2025]
- Former US NSA calls India proud and strong, criticises Trumps India strategy - The Shillong Times - September 17th, 2025 [September 17th, 2025]
- Video | Ex-US NSA's Explosive Interview: 'Navarro Keeps Picking Fights' - NDTV - September 15th, 2025 [September 15th, 2025]
- NSA, EFCC, DSS urged to probe alleged funding of bandits in Zamfara - The Guardian Nigeria News - September 15th, 2025 [September 15th, 2025]
- Ex-US NSA Reveals Navarro Once Attempted Confrontation Between Donald Trump, PM Modi - News18 - September 15th, 2025 [September 15th, 2025]
- Navarro tried to provoke Modi-Trump clash, claims ex-US NSA; says India should ignore the sideshow - Moneycontrol - September 15th, 2025 [September 15th, 2025]
- 'Erratic behaviour': Ex-US NSA John Bolton slams Trumps India tariffs; rejects claim of brokering India- - The Times of India - September 13th, 2025 [September 13th, 2025]
- Unqualified to be US Ambassador to India: Ex-US NSA slams Sergio Gor nomination; dismisses Navarros re - The Times of India - September 13th, 2025 [September 13th, 2025]
- Trump's not thinking about the effects of his actions: Ex-US NSA John Bolton - The Times of India - September 13th, 2025 [September 13th, 2025]
- NSA leaker Reality Winner is rebuilding her life -- and looking back at her past - NPR - September 13th, 2025 [September 13th, 2025]
- India should see Trump as one-time proposition: Ex-US NSA John Bolton flags number of concerns on Indian side - Mint - September 13th, 2025 [September 13th, 2025]
- Peter Navarro Tried To Start Fight Between Trump, PM Modi: Ex US NSA - NDTV - September 13th, 2025 [September 13th, 2025]
- 'Erratic behaviour': Ex-US NSA John Bolton slams Trumps India tariffs; rejects claim of brokering India-Pak peace - MSN - September 13th, 2025 [September 13th, 2025]
- India should see Trump as one-time proposition and act in its national interest: Ex-US NSA John Bolton - Tribune India - September 13th, 2025 [September 13th, 2025]
- Cyber Command, NSA to remain under single leader as officials shelve plan to end 'dual hat' - The Record from Recorded Future News - September 11th, 2025 [September 11th, 2025]
- Cyber Command, NSA to remain under the leadership of one person - SC Media - September 11th, 2025 [September 11th, 2025]
- CISA, NSA and Partners Release Shared Vision of Software Bill of Materials for Cybersecurity Guide - Homeland Security Today - September 11th, 2025 [September 11th, 2025]
- New Research Reveals How NSA is Affecting Providers, Consumers - MedLearn Publishing - September 11th, 2025 [September 11th, 2025]
- NSA, CISA and others urge for unified approach to strengthen cybersecurity resilience - Digital Watch Observatory - September 9th, 2025 [September 9th, 2025]
- Federal firefighter stationed at NSA Portsmouth saves passenger in cardiac arrest with life-saving CPR during flight - KREM - September 9th, 2025 [September 9th, 2025]
- NSA Director-General reassigned to Ministry of Finance - GhanaWeb - September 9th, 2025 [September 9th, 2025]
- Federal firefighter stationed at NSA Portsmouth saves passenger in cardiac arrest with life-saving CPR during flight - ABC10 - September 9th, 2025 [September 9th, 2025]