{"id":54233,"date":"2015-02-23T12:51:30","date_gmt":"2015-02-23T12:51:30","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=54233"},"modified":"2015-05-05T21:26:03","modified_gmt":"2015-05-05T20:26:03","slug":"researchers-find-astonishing-malware-linked-to-nsa-spying","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2015\/02\/researchers-find-astonishing-malware-linked-to-nsa-spying\/","title":{"rendered":"Researchers Find \u2018Astonishing\u2019 Malware Linked to NSA Spying"},"content":{"rendered":"<div id=\"attachment_54234\" style=\"width: 550px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/02\/keyboard-article-display-b-gchq-nsa-spying-surveillance-malware.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54234\" class=\"size-full wp-image-54234\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/02\/keyboard-article-display-b-gchq-nsa-spying-surveillance-malware.jpg\" alt=\"David Ramos\/Getty Images\" width=\"540\" height=\"359\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/02\/keyboard-article-display-b-gchq-nsa-spying-surveillance-malware.jpg 540w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/02\/keyboard-article-display-b-gchq-nsa-spying-surveillance-malware-300x199.jpg 300w\" sizes=\"auto, (max-width: 540px) 100vw, 540px\" \/><\/a><p id=\"caption-attachment-54234\" class=\"wp-caption-text\">David Ramos\/Getty Images<\/p><\/div>\n<p><em>17 Feb 2015 &#8211; <\/em>Security researchers have uncovered highly sophisticated malware that is linked to a secret National Security Agency hacking operation exposed by <em>The Intercept<\/em> last year.<\/p>\n<p>Russian security firm Kaspersky <a target=\"_blank\" href=\"http:\/\/securelist.com\/blog\/research\/68750\/equation-the-death-star-of-malware-galaxy\/\" >published a report<\/a> Monday [16 Feb 2015] documenting the malware, which it said had been used to infect thousands of computer systems and steal data in 30 countries around the world. Among the targets were a series of unnamed governments; telecom, energy and aerospace companies; as well as Islamic scholars and media organizations.<\/p>\n<p>Kaspersky did not name the NSA as the author of the malware. However, <em>Reuters<\/em> <a target=\"_blank\" href=\"http:\/\/www.reuters.com\/article\/2015\/02\/16\/us-usa-cyberspying-idUSKBN0LK1QV20150216\" >reported<\/a> later on Monday that the agency had created the technology, citing anonymous former U.S. intelligence officials.<\/p>\n<p>Kaspersky\u2019s researchers noted that the newly found malware is similar to Stuxnet, a covert tool <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/stuxnet-was-work-of-us-and-israeli-experts-officials-say\/2012\/06\/01\/gJQAlnEy6U_story.html\" >reportedly<\/a> created by the U.S. government to sabotage Iranian nuclear systems. The researchers also identified a series of code names that they found contained within the samples of malware, including STRAIGHTACID, STRAITSHOOTER<em>\u00a0<\/em>and GROK<em>.<\/em><\/p>\n<p>Notably, GROK, which Kaspersky said is a piece of malware used to secretly log keystrokes, is tied to secret NSA hacking tactics described in documents from whistleblower Edward Snowden. Last year, <em>The Intercept<\/em> <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/03\/12\/nsa-plans-infect-millions-computers-malware\/\" >revealed<\/a> that the NSA was using a tool called GROK to log keystrokes as part of a toolkit it uses to hack computers and collect data.<\/p>\n<p>The other codenames identified by Kaspersky on Tuesday\u2014such as STRAIGHTACID and STRAITSHOOTER\u2014are strikingly similar to known NSA hacking operations. Leaked NSA documents have revealed that the agency uses hacking tools known as <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/03\/12\/nsa-gchqs-quantumtheory-hacking-tactics\/\" >STRAIGHTBIZARRE<\/a> and <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/2013\/oct\/04\/tor-attacks-nsa-users-online-anonymity\" >FOXACID<\/a> to break into computers and grab data.<\/p>\n<p>According to Kaspersky, the malware found in the latest discovery is the most advanced ever found and represents an \u201castonishing technical accomplishment.\u201d It hides deep within an infected computer and can stay on the machine even after attempts to wipe or reformat the hard drive. The security firm has dubbed different variants of the malware EquationLaser, EquationDrug and GrayFish, and they are calling its creators the \u201cEquation Group,\u201d because of the way the spy technology attempts to hide itself in an infected computer using complex encryption.<\/p>\n<p>The majority of the infected machines found by Kaspersky were in Iran. But the security firm has also found infected computers in Belgium, Germany, the United States, the United Kingdom, Russia, Afghanistan, Pakistan, Sudan, Lebanon and the Palestinian Territories.<\/p>\n<p>According to <em><a target=\"_blank\" href=\"http:\/\/www.wired.com\/2015\/02\/kapersky-discovers-equation-group\/\" >Wired<\/a><\/em>, the targets in the U.S. and the U.K. were all Islamic activists or scholars. The Kaspersky researchers reportedly first discovered the Equation Group malware while researching Regin, a spy tool that <em>The Intercept<\/em> <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/11\/24\/secret-regin-malware-belgacom-nsa-gchq\/\" >revealed<\/a> in December appears to have been used in British and American government hacking operations <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/12\/13\/belgacom-hack-gchq-inside-story\/\" >targeting a Belgian telecommunications company<\/a> and offices used by European Union officials.<\/p>\n<p>NSA spokeswoman Vanee Vines told <em>The Intercept<\/em> the agency was aware of Kaspersky\u2019s research, but said the agency was \u201cnot going to comment publicly on any allegations that the report raises, or discuss any details.\u201d<\/p>\n<p>________________________<\/p>\n<p><em>Email the author: <a href=\"mailto:ryan.gallagher@theintercept.com\">ryan.gallagher@theintercept.com<\/a><\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2015\/02\/17\/nsa-kaspersky-equation-group-malware\/\" >Go to Original \u2013 firstlook.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>17 Feb 2015 &#8211; Security researchers have uncovered highly sophisticated malware that is linked to a secret National Security Agency hacking operation exposed by The Intercept last year.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-54233","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/54233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=54233"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/54233\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=54233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=54233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=54233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}