Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

JonLP24

(29,322 posts)
Mon Jun 15, 2015, 09:22 AM Jun 2015

None of us is safe: Major cybersecurity company hacked

From July 10th but may have been overshadowed by the other one.

Guess what: Even the best security companies can be hacked.

That's what Moscow-based Kaspersky Lab said Wednesday when it announced its systems had been attacked, most likely by hackers working on behalf of a country.

Kaspersky customer's data is safe, the company said. The sophisticated attack stayed away from user information and focused instead on Kapersky's own systems and intellectual property, the company said. The company has since fixed the hole that allowed for the attack.

The attack isn't the first that's targeted Kaspersky, but it highlights how prolific hacking has become, and how vulnerable even the most knowledgeable and prepared companies are. Of course, everyone else is in an even bigger pickle. Attacks are happening to companies small and large every day, and they've even been able to break into US government computers.

Verizon Enterprise Solutions estimated that 700 million compromised records from companies around the world led to losses of $400 million in 2014. The information was based only on the 70 organizations that contributed information to their annual study, so the total figure is likely much higher.

The hackers were "a generation ahead of anything seen," Kaspersky said in a lengthy explanation of the hack on its website. The attackers used a method that preys on "zero-day" vulnerabilities, or holes in software that developers don't know exist. They left few traces too.

http://www.cnet.com/news/none-of-us-are-safe-major-cybersecurity-company-hacked/

I like how they have detailed info on the hack: http://media.kaspersky.com/en/Duqu-2-0-Frequently-Asked-Questions.pdf

3 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
None of us is safe: Major cybersecurity company hacked (Original Post) JonLP24 Jun 2015 OP
On the upside, it's good to know that America is still #1 at something. Exilednight Jun 2015 #1
Here is some more background JonLP24 Jun 2015 #2
Kaspersky is a Russian company. (nt) jeff47 Jun 2015 #3

Exilednight

(9,359 posts)
1. On the upside, it's good to know that America is still #1 at something.
Mon Jun 15, 2015, 09:28 AM
Jun 2015

On the downside, that something is, getting hacked.

JonLP24

(29,322 posts)
2. Here is some more background
Mon Jun 15, 2015, 09:38 AM
Jun 2015

Duqu 2.0 Exposed

Over the last five years, Kaspersky has made a name for itself exposing one nation-state attack after another, including Stuxnet, Duqu, Flame, Gauss, Regin and the Equation Group—many of them seemingly launched by the US and its UK and Israeli allies. It was perhaps inevitable that Kaspersky eventually would be targeted itself.
Side-by-side comparison showing a near identical function, for generating log entries, in the Duqu 2011 and 2015 attacks.

(they have a picture side-by-side of the code used in 2011 and 2015)

Kaspersky uncovered the breach after an engineer, testing a new product on a company server, spotted anomalous traffic that caused him to further investigate. Eventually the company determined that a couple dozen Kaspersky systems had been infected. The company won’t say when exactly the intrusion began to preserve the integrity of the investigation, but Raiu says they’re working with law enforcement agencies in several countries to track the breach of Kaspersky as well as other victims. The company has also filed police complaints in Russia and the UK, where it also has an office.
Mode of Infection

The infection of Kaspersky unfolded like a precision campaign. The attackers first targeted an employee in one of the company’s Asia-Pacific offices, likely using a spear-phishing attack and zero-day exploit to breach the system. The employee’s machine had all the latest software patches installed, but zero-day exploits target vulnerabilities that are yet unknown to a software maker, and therefore have no patches available to seal them.

Another indication that a spear-phishing email was used was the fact that while Kaspersky was investigating the breach, the attackers wiped the mailbox and browsing history from the infected employee’s system, preventing Kaspersky from fully analyzing it.

<snip>

What They Were After

The attackers were primarily interested in Kaspersky’s work on APT nation-state attacks–especially with the Equation Group and Regin campaigns. Regin was a sophisticated spy tool Kaspersky found in the wild last year that was used to hack the Belgian telecom Belgacom and the European Commission. It’s believed to have been developed by the UK’s intelligence agency GCHQ.

The Equation Group is the name Kaspersky gave an attack team behind a suite of different surveillance tools it exposed earlier this year. These tools are believed to be the same ones disclosed in the so-called NSA ANT catalogue published in 2013 by journalists in Germany. The interest in attacks attributed to the NSA and GCHQ is not surprising if indeed the nation behind Duqu 2.0 is Israel.

<snip>

There was one victim, however, that didn’t fit the profile of other targets. Raiu says this was an international gathering for the 70th anniversary of the liberation of the Auschwitz-Birkenau concentration camps. The focus in this case may have been on the scores of VIPs who attended the event, including presidents and prime ministers. “Pretty much everyone was there with the exception of Obama and Putin,” Raiu notes.

In addition to all of these targets, Symantec uncovered victims in the UK, Sweden, Hong Kong and India. Notably, it found telecom victims in Europe and Africa, an electronics firm in South East Asia, and multiple infections in the US, including one organization where developers working on mobile platforms were infected. Some of the infections dated back to 2013, according to Vikram Thakur, senior manager for the company’s Security Response team.


http://www.wired.com/2015/06/kaspersky-finds-new-nation-state-attack-network/

I think I'm gonna have to grab the popcorn here.

Latest Discussions»General Discussion»None of us is safe: Major...