Remember “The Shadow Brokers” and the arrest of a former NSA contractor accused of stealing 50 Terabytes of top secret documents from the intelligence agency? It turns out that, Kaspersky Lab, which has been banned in US government computers over spying fears, was the one who tipped off the U.S. government and helped the FBI catch NSA contractor Harold T. Martin III, unnamed sources familiar with the investigation told Politico. In October 2016, the U.S. government arrested and charged Martin, 51, with theft of highly classified documents, including most sensitive NSA hacking tools and top-secret information about “national defense,” that he siphoned from government computers over the period of two decades. The breach is believed to be the largest heist of classified government material in America's history, far bigger than Edward Snowden leaks. According to the sources, the Antivirus firm learned about Martin after he sent unusual direct messages via Twitter to its two researchers in 2016, just 30 minutes before the Shadow Brokers hacking group began leaking classified NSA hacking tools on the Internet. “The case unfolded after someone who U.S. prosecutors believe was Martin used an anonymous Twitter account with the name ‘HAL999999999' to send five cryptic, private messages to two researchers at the Moscow-based security firm,” Politico reports. “The first message sent on Aug. 13, 2016, asked one of the researchers to arrange a conversation with ‘Yevgeny' — presumably Kaspersky Lab CEO Eugene Kaspersky, whose given name is Yevgeny Kaspersky.” The timing of the Twitter messages, the Shadow Brokers leaks, and other clues like HAL999999999 Twitter profile linked to Martin and Martin access to the NSA's elite hacking unit, immediately triggered a red flag at Kaspersky, who then reported the communication to the NSA. However, it should be noted that Martin, who is set to go on trial in June, is currently facing 20 counts of unauthorized and willful retention of national defense information, and the FBI doesn't have any evidence to link him with the Shadow Brokers. By the way, don't confuse the Martin case with the case of Nghia Hoang Pho, 67, a developer for the the NSA's Tailored Access Operations Division who was sentenced to 5.5 years in prison last year to illegally taking classified documents home, which were later stolen by Russian hackers from his home PC that was running Kaspersky antivirus. In the Pho's case, the U.S. government accused Kaspersky Lab of colluding with the Russian intelligence agency to obtain and expose the classified NSA data from the NSA employee's computer. Ironically, Martin was arrested at a time when the FBI was engaged in an aggressive campaign against Kaspersky Labs to discredit it and get its software banned from US federal computers for the sake of national security. Even though Kaspersky Lab vigorously and repeatedly denied these accusations, its software and services was banned for government use by a law signed by President Donald Trump in December of 2017 and later by the Department of Homeland Security (DHS) over spying fears. At the time of his arrest in August 2016, Martin worked for Booz Allen Hamilton Holding Corp, the same company previously employed Edward Snowden who also leaked classified documents in 2013 that exposed secret surveillance programs carried out by the NSA.
Remember “The Shadow Brokers” and the arrest of a former NSA contractor accused of stealing 50 Terabytes of top secret documents from the intelligence agency?
It turns out that, Kaspersky Lab, which has been banned in US government computers over spying fears, was the one who tipped off the U.S. government and helped the FBI catch NSA contractor Harold T. Martin III, unnamed sources familiar
A remote attacker could exploit the vulnerability simply by sending an email.
Researchers think an organized crime gang is running the massive campaigns, prepping for large-scale follow-on attacks on Android users.
Once downloaded, the fake apps hide themselves on the victim’s device and continue to show a full-screen ad every 15 minutes.
Despite fewer plugins being added to WordPress last year, the CMS saw an astounding tripling of vulnerabilities in its platform in 2018.
Should we pump the brakes on the roll out of biometric security to first consider whether we are creating new vulnerabilities?
By Uzair Amir Google has now removed all 85 Adware from Play Store. Reportedly, 85 Android applications on Google Play Store were discovered to be sending dangerous, full-screen adware to users. These apps collectively have been installed approx. 9 million times across the world. It is identified that the apps had a built-in adware strain that could display […] This is a post from HackRead.com Read the original post: 9 million users installed 85 adware infected apps from Play Store
As the hype at CES demonstrates, 5G is the newest and shiniest tech bauble out there: but security concerns loom.
Overall, the chip giant patched five vulnerabilities across an array of its products.
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com