Tuesday, April 8, 2025
HomeData BreachRussian Hackers Stole NSA Hacking Tools Using Kaspersky Software

Russian Hackers Stole NSA Hacking Tools Using Kaspersky Software

Published on

SIEM as a Service

Follow Us on Google News

Russian Government Hackers are using Kaspersky software to stole NSA Advance cyber Weapons such as secret spying tools from NSA Contractor Personal Home Computer who has been used the Russian Based Kaspersky Security Products.

This Incident reported by The Wall Street Journal  says, Stolen Information are Highly Sensitive Data such as how the NSA penetrates foreign computer networks.

Few Weeks Before, Kaspersky Security Softwares Ban to Use all US Government Agencies including NSA for a lot of Spying Activity Controversy against the Kaspersky Products.

- Advertisement - Google News

Reason of Kaspersky Ban Stats that, access provided by Kaspersky products to compromise federal information and information systems directly implicates U.S. National security Because Kaspersky Software usually Communicate Directly into every file on the computers which Protect by them and it keeps communicate with Kaspersky Labs

This incident Leads to taking Advance by Russian Hackers and offers some of the useful and important insights that makes very hard for NSA Operations.

Also Read: Kaspersky Security Softwares Ban to Use all US Government Agencies

How Do Russian Hackers Steal NSA Hacking Tools

NSA Strictly Prohibited to take any information neither Data nor NSA Hacking Tools by any of their Contractors from its sensitive secrete Zone Because they Maintain Extremely Secret Cyber operation Details.

This incident Reported that One of the unnamed NSA Contractor has removed the material from the NSA and stored it on a home computer that ran a version of Kaspersky AV.

The Material Contains some of the Confidential Information such as “details about how the NSA penetrates foreign computer networks, the computer code it uses for such spying, and how it defends networks inside the US.

Security Experts Believes that NSA used Kaspersky Security Software alerts to Russian Hackers about the Presence of files that may have been taken from the NSA.

According to Wall Street Journal, Experts said the software, in searching for malicious code, may have found samples of it in the data the contractor removed from the NSA.
But how the antivirus system made that determination is unclear, such as whether Kaspersky technicians programed the software to look for specific parameters that indicated NSA material. Also unclear is whether Kaspersky employees alerted the Russian government to the finding.

No Information about the NSA Contractor Details was Revealed and The report also said it was unclear whether the contractor had lost his job or is facing prosecution.

Last Year Another NSA Contractor who had worked as a contractor for the NSA has been arrested for allegedly stealing classified material from NSA but he is not the person implicated in this case.

NSA Officials said, The man took his work home in violation of NSA rules, and Russian hackers were able to identify the material and access his machine because he was using Kaspersky software.

Kaspersky Denied Statement

Kaspersky says about this allegation, that Kaspersky Lab has not been provided any evidence substantiating the company’s involvement in the alleged incident Kaspersky Lab has not been provided any evidence substantiating the company’s involvement in the alleged incident.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified...

Everest Ransomware Gang’s Leak Site Hacked and Defaced

TechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app...

ToddyCat Attackers Exploited ESET Command Line Scanner Vulnerability to Conceal Their Tool

In a sophisticated cyberattack, the notorious ToddyCat APT group utilized a previously unknown vulnerability...

Threat Actors Use VPS Hosting Providers to Deliver Malware and Evade Detection

Cybercriminals are intensifying phishing campaigns to spread the Grandoreiro banking trojan, targeting users primarily...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

State Bar of Texas Confirms Data Breach, Begins Notifying Affected Consumers

The State Bar of Texas has confirmed a data breach following the detection of...

Oracle Confirms The Data Breach- Starts Initiating Client Notifications

Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking...

Massive 400GB X (Twitter) Data Leaked – 2.8 Billion Records Exposed

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has...