New Developments Explain How Russia Obtained NSA’s Internal Details – And Guess Who’s in the Middle??
In 2015, the National Security Agency (NSA) suffered a data breach, that went undetected until early spring of 2016. The breach was direct aftermath of a contractor transferring highly classified information to his home PC. The hackers, who were hired by the Kremlin, were able to infiltrate the contractor’s data through their security software of choice. The data obtained included how the NSA infiltrates foreign networks, the coding it uses to do so, and how it protects its internal networks within the U.S. I’ll give you three guesses which security company it was — but I bet you’ll only need one.
Although, it comes as no surprise Kaspersky is denying any sort of involvement with the NSA breach. In a statement to the Wall Street Journal, Kaspersky Lab reported it “has not been provided any information or evidence substantiating this alleged incident, and as a result, we must assume that this is another example of a false accusation.”
There are two particular points these details have brought to light. First, it is time to reevaluate the contractors used in the U.S. government sector. After all, this is the third security breach involving classified government data, tied to the lackadaisical practices of contractors in the last four years. Second, the U.S. government is moving in the right direction regarding removing Kaspersky Labs products from federal and military devices.
Hackers, who were hired by the Kremlin, used Kaspersky’s antivirus to obtain information regarding the internal workings of the NSA. Would any security company confirm they colluded with the Kremlin to hack another nation’s government agency? No. Whether or not Kaspersky Labs was directly involved with the NSA breach will remain up for public speculation.
However, now the question is, do you still feel safe using this company’s products to keep your data secure?