![]() ![]() ![]() Within a few days and at the direction of CEO and founder Eugene Kaspersky, the company deleted all materials except for the malicious binaries. A company analyst who manually reviewed the archive quickly determined it contained confidential material. The downloads-which, like other AV software, the Kaspersky program automatically initiated when it encountered suspicious software that warranted further inspection-included a 45MB 7-Zip archive that contained source code, malicious executables, and four documents bearing US government classification markings. Starting on Septemand running until November 9 of that year, Kaspersky Lab servers downloaded the confidential files multiple times after the company's antivirus software, which was installed on the machine, found they contained malicious code from Equation Group, an NSA-linked hacking group that operated for at least 14 years before Kaspersky exposed it in 2015. Further Reading How “omnipotent” hackers tied to NSA hid for 14 years-and were found at lastThe classified source code, documents, and executable binaries were stored on a computer that used an IP address reserved for Verizon FIOS customers in Baltimore, about 20 miles from the NSA's Fort Meade, Maryland, headquarters, Kaspersky Lab said in an investigation report it published early Thursday morning.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |