There has been a series of speculations and theories that the Kaspersky’s antivirus program functions differently, and provides a secret backdoor to Russian intelligence. Does the allegation have a decent basis? Or a mere coincidence?
The Kaspersky Lab is previously a well-regarded information security firm founded in 1997 by a Russian national named Eugene V. Kaspersky. For some years until now, during the emergence of the Kaspersky Antivirus Program, the company has dominated the United States and Western Europe, having $374 million dollars annual sales emanate thereat. Moreover, powerful U.S. agencies like the State Department, the Department of Defense, Department of Energy, Justice Department, Treasury Department, Army, Navy and Air Force, utilize Kaspersky Antivirus for their cyber-security.
U.S. agencies have feared the capabilities of Kaspersky that like any security software, it requires access to every information stored in a computer to scan for malware and viruses.
Last 2015, Kaspersky Lab have reported a detected cyber-intrusion affecting several of their internal systems. Due to their large-scale investigation, it was found out that the intrusion was caused by a malware dubbed as “Duqu 2.0.” The Kaspersky Lab claimed to have halted the intrusion, and that their attackers were already “lost.” The company have traced and announced the previous attacks of the malware, yet they have not disclosed its true origin.
Up until recently, this 2017, there has been a series of speculations and theories that the Kaspersky’s antivirus program functions differently, and provides a secret backdoor to Russian intelligence. Global concerns about Kaspersky have emerged in the cybersecurity industry, and allege that Kaspersky is not a tool for cyber-security, but for global espionage.
This June, 2017, the Russian government have ordered its agencies to exercise tight control over industries operating within its borders. The government demanded source code for several programs including Kaspersky. Kaspersky, on the other hand, have denied any collaboration with the Russian government and claimed to have kept their source code to themselves.
It was reported last week that one of the incredibly important NSA programs for intelligence collection fell in the hands of Russian intelligence. Still, the NSA have discovered that Russia have successfully carried out the breach by using a Kaspersky anti-virus software installed in a carelessly managed home computer belonging to an employee of NSA’s Tailored Access Operations Division.
Now, the Israeli intelligence, while admitting to be the perpetrator of the 2015 Kaspersky hack, have informed the NSA that they have uncovered that the Russian Government is ultimately using the Kaspersky’s access to computers spread all throughout the United States to aggressively scan for American government classified programs, while retrieving vital information back into Russian intelligence systems. With supporting evidence and documentation, it is now precisely clear that Kaspersky programs have limitless access to US computers.
Kaspersky Lab employs a standard industry technique that detects computer viruses but can also be employed to identify information and other data that may not be malware-related. The standard tool is known as “silent signatures,” or strings of digital code that operate in unknowingly to find malware. Unfortunately, this signature can also be written differently to search for different information apart from malware code.
Whether the Kaspersky Lab is actually collaborating with Russian Intelligence agencies or it was just an unknown breach in Kaspersky Lab, it was fairly sure that government agencies should steer clear from the said software until all allegations have been properly cleared.