Russia to protect its own network by stealing NSA’s Cybersecurity strategy

NSA suffered a major blow in spring 2016 post the robbery of its cybersecurity strategy by the Russian Intelligence in 2015.

0
132
Russia protects its own network
NSA breach raises eyebrows over Kaspersky’s ties with Russian Intelligence

National Security Agency (NSA) underwent a major breach by the Russian Intelligence in 2015. The breach exposed NSA’s cyberwarfare strategy, which included methods to hack foreign networks and defend their own.

The data will enable the Russians to infiltrate the U.S. networks and protect their own network from hacking. It is speculated the Russian Intelligence took help of Kaspersky Lab anti-virus software in attack, based in the country itself.

It is suspected that the data was breached from home computer of an NSA contractor. The contractor took NSA documents home from office and uploaded on his home computer.

The method for carrying out attack has not found out yet. The attack was executed by downloading and storing files considered suspicious on its servers. NSA has contacted Kaspersky to obtain more information.

The Department of Homeland Security issued an order to stop using Kaspersky anti-virus in government agencies. In an order issued in September 2017, the department raised concerns over ties between the Russian Intelligence and certain Kaspersky officials.

Kaspersky denies any ties with Russian government and stated that the allegations have no basis. Kaspersky commented, “There has not been provided any information or evidence substantiating this alleged incident.”

NSA breach, considered as one of the major breaches in recent years occurred in 2015 and discovered by NSA in spring of 2016. It is speculated that this breach might have given an advantage to the Russian Intelligence to interfere in 2016 Presidential elections in the U.S.

The methods of breaching are not yet found. The breach was given a code name. The stolen files include not only the cybersecurity strategy, but also codes used to implement attacks.

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here