{"id":19794,"date":"2017-10-16T11:24:15","date_gmt":"2017-10-16T15:24:15","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=19794"},"modified":"2022-05-05T04:36:11","modified_gmt":"2022-05-05T08:36:11","slug":"kaspersky-in-the-shitstorm","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/kaspersky-in-the-shitstorm\/19794\/","title":{"rendered":"What just hit the fan: FAQs"},"content":{"rendered":"<p><strong>What\u2019s going on? Why are the media writing about Kaspersky?<\/strong><\/p>\n<p>From time to time, English-speaking media raise claims that Western intelligence agencies suspect Kaspersky Lab has been working for intelligence services. This time, the situation has escalated. In a nutshell, several English-language media outlets simultaneously wrote that a Kaspersky Lab security solution was allegedly used to steal secret NSA files. According to the story, these files were brought home by an NSA contractor (or employee) who had a Kaspersky Lab product installed on his home computer. Then some Russian gov hackers \u2014 no specifics were provided \u2014 allegedly gained possession of these files.<\/p>\n<p><strong>So, this contractor just took secret files and brought them home?<\/strong><\/p>\n<p>All of these publications are based on information from anonymous sources, so that is impossible to verify. However, that is indeed what they are saying: that the NSA contractor just copied top secret information onto a thumb drive and brought it home. And here <a href=\"https:\/\/www.thedailybeast.com\/elite-hackers-stealing-nsa-secrets-is-childs-play\" target=\"_blank\" rel=\"noopener nofollow\">they also say<\/a> that carrying secret information out of an elite department of NSA hackers is child\u2019s play.<\/p>\n<p><strong>What kind of secret files were they?<\/strong><\/p>\n<p>No specific information on that. It\u2019s possible that it was some kind of cyberweapon \u2014 military\/spy malware. It sounds like this contractor decided to work on a cyberweapon from home, and our antivirus detected it. What a surprise!<\/p>\n<p><strong>What does Israel have to do with it?<\/strong><\/p>\n<p>In the latest news, an unnamed source told reporters that Israeli intelligence, which allegedly hacked Kaspersky Lab in 2015, saw and confirmed that our antivirus helped Russian hackers get a hold of those very secret files that the unnamed NSA contractor brought home.<\/p>\n<p><strong>But what evidence has been provided?<\/strong><\/p>\n<p>No one has provided any evidence at all.<\/p>\n<p><strong>Where did the reporters get their information?<\/strong><\/p>\n<p>That wasn\u2019t specified either. The media <a href=\"https:\/\/www.wsj.com\/articles\/russian-hackers-stole-nsa-data-on-u-s-cyber-defense-1507222108\" target=\"_blank\" rel=\"noopener nofollow\">fall back on wording like<\/a> \u201caccording to multiple people with knowledge of the matter.\u201d No names, no titles, nothing. Moreover, the reporters themselves haven\u2019t succeeded in getting any official confirmation or commentary \u2014 except for our comments denying this nonsense.<\/p>\n<p>Having an anonymous source means there is no publicly available evidence, no one takes responsibility for their words; there is no way to verify the information, and one must simply decide whether to believe the story without any proof.<\/p>\n<p><strong>Which part of it <em>is<\/em> true?<\/strong><\/p>\n<p>That is also unclear, because \u2014 you guessed it \u2014 the source is anonymous and no evidence is available. There was a mention of it happening in 2015, and that was indeed the year our internal network got hacked. You can read more about that <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-statement-duqu-attack\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>. Amusingly, our <a href=\"https:\/\/media.kaspersky.com\/en\/Duqu-2-0-Frequently-Asked-Questions.pdf\" target=\"_blank\" rel=\"noopener nofollow\">report on Duqu 2.0<\/a> is the only part of the story with verifiable facts. To investigate the rest, we have to ask involved authorities and other organizations to inquire about the facts reported by the media.<\/p>\n<p>If we are talking not about facts, but rather opinions, then we must note that one side of the story has several US media referencing anonymous sources in intelligence agencies, and the other side has very specific statements made by reputable people and organizations, such as <a href=\"http:\/\/www.reuters.com\/article\/us-usa-security-kaspersky-interpol\/kasperskys-u-s-spat-a-sign-of-balkanisation-in-cyber-world-interpol-idUSKBN1CF26O?il=0\" target=\"_blank\" rel=\"noopener nofollow\">Interpol<\/a> and <a href=\"http:\/\/www.dw.com\/en\/germany-no-evidence-russia-used-kaspersky-software-to-spy-on-us\/a-40915126\" target=\"_blank\" rel=\"noopener nofollow\">BSI<\/a>. In the latter case, the specialists state that there is no supporting evidence about Kaspersky Lab performing espionage, that there is no reason to sound any alarms about Kaspersky Lab products, and that we do have a common goal \u2014 fighting cybercrime.<\/p>\n<p><strong>Russian hackers, you say? Is Kaspersky really working with Russian intelligence agencies?<\/strong><\/p>\n<p>We help law enforcement agencies (globally, not only in Russia), but with only one thing \u2014catching cybercriminals.<\/p>\n<p>This collaboration sometimes helps us create, for example, <a href=\"https:\/\/noransom.kaspersky.com\/\" target=\"_blank\" rel=\"noopener\">ransomware decryptors<\/a>, helping victims recover lost files (free; we don\u2019t get paid for that). We also create other useful things, such as a website one can use to check whether their computer is a part of a botnet.<\/p>\n<p>We\u2019ve never assisted any cyberspies or military intelligence. That would go against our principles. We do not participate in spying.<\/p>\n<p><strong>Is it true that Kaspersky Anti-Virus collects data from your computer?<\/strong><\/p>\n<p>Yes, it is true, but it doesn\u2019t collect personal data such as documents and photos. Our products, much like antivirus software from most other companies, have a cloud protection component. It quickly reacts to any new threats and protects all of our users quite literally within a minute. We call this Kaspersky Security Network (KSN). As KSN works, the antivirus may actually transfer files to the cloud, but only if they\u2019re related to malicious or suspicious files. More detail about this may <a href=\"https:\/\/www.kaspersky.com\/about\/data-protection\" target=\"_blank\" rel=\"noopener nofollow\">be found here<\/a>.<\/p>\n<p>And you can turn KSN off when installing the product or at any time after installation in the protection settings. If you like to develop cyberweapons on your home computer, it would be quite logical to turn KSN off \u2014 otherwise your malicious software will end up in our antivirus database and all your work will have been in vain. Our corporate customers can choose to use KPSN, our Private Security Network, instead, which provides the same level of protection, but does not transmit data to Kaspersky Lab\u2019s servers.<\/p>\n<p><strong>Government agencies in the US are turning away from using Kaspersky products. Should I do the same?<\/strong><\/p>\n<p>All of this nonsense is just geopolitics, which has nothing to do with whether we make good security solutions. According to data from independent research \u2014 independent from both Russian hackers and American politicians \u2014 our solutions are <a href=\"https:\/\/www.kaspersky.ru\/top3\/\" target=\"_blank\" rel=\"noopener\">among the best<\/a>, and in terms of comprehensiveness, the best overall. So decide for yourself.<\/p>\n<p><strong>So, what <em>really<\/em> happened?<\/strong><\/p>\n<p>We couldn\u2019t leave those allegations unanswered, so we ran an internal investigation to gain a better understanding and get the actual facts. The results of this investigation turned out to be very interesting. We have a <a href=\"https:\/\/www.kaspersky.com\/blog\/internal-investigation-preliminary-results\/19894\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">special post dedicated to our findings<\/a>.<\/p>\n<p>We hope this post makes it easier for you to understand what\u2019s really going on.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What Russian hackers, American spies, the Israeli Intelligence Service, and Kaspersky Lab have to do with each other. What is happening, anyway?<\/p>\n","protected":false},"author":2706,"featured_media":19795,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2684],"tags":[906,197,2704,352,741,2706,2705,97],"class_list":{"0":"post-19794","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-special-projects","8":"tag-cia","9":"tag-duqu","10":"tag-duqu-2-0","11":"tag-kaspersky-lab","12":"tag-nsa","13":"tag-plain-words","14":"tag-russian-hackers","15":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kaspersky-in-the-shitstorm\/19794\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/kaspersky-in-the-shitstorm\/11574\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/kaspersky-in-the-shitstorm\/13007\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/kaspersky-in-the-shitstorm\/11926\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/kaspersky-in-the-shitstorm\/19003\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/kaspersky-in-the-shitstorm\/8337\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/kaspersky-in-the-shitstorm\/18460\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-in-the-shitstorm\/18908\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/plain-words\/","name":"plain words"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19794"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19794\/revisions"}],"predecessor-version":[{"id":29897,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19794\/revisions\/29897"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19795"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}