The U.S. National Security Agency (NSA) routinely buries malicious software (malware) within popular hard drives made by manufacturers such as Western Digital, Seagate, Toshiba and others – giving them access to the majority of the world’s computers, researchers say.
That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.
Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia,Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said.
The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was used to attack Iran’s uranium enrichment facility. The NSA is the agency responsible for gathering electronic intelligence on behalf of the United States.
A former NSA employee told Reuters that Kaspersky’s analysis was correct, and that people still in the intelligence agency valued these spying programs as highly as Stuxnet. Another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it.
NSA spokeswoman Vanee Vines declined to comment.
Latest posts by Sean Adl-Tabatabai (see all)
- President Trump Declares Black Lives Matter a ‘Marxist Group’ - August 5, 2020
- Cher SNAPS: ‘F**k Those Heartless Republican Gutter Rats’ - August 5, 2020
- Checkpoint Charlie: De Blasio Sets up Quarantine Checkpoints at ‘Major Entry Points’ in NYC - August 5, 2020