Former Employees Accuse Kaspersky Lab of Faking Malware 90
An anonymous reader writes: Reuters reports that two former employees of Moscow-based Kaspersky Lab faked malware to damage the reputations of their rivals. The alleged campaign targeted Microsoft, AVG, Avast, and others, tricking them into classifying harmless files as viruses. The ex-employees said co-founder Eugene Kaspersky ordered some of the attacks as retaliation for emulating his software. The company denied the allegations, and Kaspersky himself reiterated them, adding, "Such actions are unethical, dishonest and their legality is at least questionable." The targeted companies had previously said somebody tried to induce false positives in their software, but they declined to comment on the new allegations. "In one technique, Kaspersky's engineers would take an important piece of software commonly found in PCs and inject bad code into it so that the file looked like it was infected, the ex-employees said. They would send the doctored file anonymously to VirusTotal." The alleged attacks went on for more than 10 years, peaking between 2009 and 2013.
Free alternatives? (Score:1)
There don't seem to be very many good free alternatives other than microsoft's default package. I've wondered if it's possible for me to make my own security system, but I've never given it a good amount of thought.
If classification is the name of the game, couldn't you use some machine learning techniques based on what malware does and write your own classifier?
Re:Free alternatives? (Score:5, Interesting)
Project I've been working on for the past 15 years. Take it or leave it.
Re: (Score:1)
Thanks ill give it a try next time I run across an infected system.
Re: (Score:2)
Some obscure group of dudes that call themselves "Temple of Transgression" and develop an antivirus (ok, ok, only the frontend) in VB6 are fighting hard for not being taken seriously.
Re: (Score:1)
http://tot-ltd.org/blacklist/ [tot-ltd.org]
http://tot-ltd.org/whitelist/ [tot-ltd.org]
http://tot-ltd.org/files-wl/ [tot-ltd.org]
http://tot-ltd.org/installatio... [tot-ltd.org]
http://tot-ltd.org/ports [tot-ltd.org]
http://tot-ltd.org/API [tot-ltd.org]
http://tot-ltd.org/packer.db [tot-ltd.org]
Re: (Score:1)
Re: (Score:1)
I don't see anyone clamoring to pay my bills either, so I'm not really inclined to care what I use beyond notepad.
Re: (Score:3)
There don't seem to be very many good free alternatives other than microsoft's default package. I've wondered if it's possible for me to make my own security system, but I've never given it a good amount of thought.
If classification is the name of the game, couldn't you use some machine learning techniques based on what malware does and write your own classifier?
If I remember right Thunderbyte Antivirus did something much like that. At some point Thunderbyte was bought-out and I honestly have no idea what happened after that.
In my opinion, the best approach for malware that is pulled-in by the user is to restrict what the user can do to the computer. Yes, that means annoying issues installing software such that a privileged account has to be logged into, but it also means that if the user makes serious mistakes the solution is to back up their non-executable d
Re: Free alternatives? (Score:2)
In regards to Thunderbyte, they were acquired by Norman ASA (www.norman.com). In 2014, Norman ASA was acquired by AVG.
Re:Free alternatives? (Score:4)
A hacker can really screw with someone without elevating to admin. All the juicy stuff is in the user accounts anyway. In a few seconds they can get your financial information, passwords, email contacts, the screenplay you're working on, any photos of an adult nature that happen to be there...
In contrast, the admin account is quite dull. You already know what's on that. I get the point that once you get admin you can install your badware and stick around for a while, but once you've got all the really good stuff is in the user accounts why bother.
Re: (Score:3)
There don't seem to be very many good free alternatives other than microsoft's default package.
at risk of stating the obvious ... er ... linux? :)
I've wondered if it's possible for me to make my own security system, but I've never given it a good amount of thought.
it's possible. it's also hard. start giving it some good amount of thought and stop making yourself a target by using the 'default package'. it will be easier from there ...
Provably impossible (Score:4, Interesting)
... where you analyze the executable and then based off that determine if it's malicious or not.
That's provably impossible. It's trivial to convert it to the halting problem.
Re:Provably impossible (Score:4, Funny)
That's provably impossible. It's trivial to convert it to the halting problem.
They worked that out centuries ago when securing castles. That's why the guards shout "Halt! Who goes there?"
Re:Free alternatives? (Score:4, Insightful)
There don't seem to be very many good free alternatives other than microsoft's default package.
Signature-based anit-malware solutions require an industrial-scale operation to identify new threats and add them to the signatures. That's very costly: Those workers have to eat, so they have to be paid somehow.
Since Microsoft is pretty much the only company with a revenue stream that is substantially improved by protecting Microsoft systems generally, it is similarly pretty much the only operation that can profit by spending such industrial-scale money deploying new defences "for free".
But there are still a few who find ways to make it possible. One of the best after-infection malware-removal tools out there is Malwarebytes. They distribute a stripped-down, manually-operated, nagware version of their product for free, in the hopes that you'll subscribe to the full-function version (to get additional functionality, including automated scheduled execution, and/or spare your attention from constantly closing their popups that covered your working window. B-) )
Re: (Score:2)
I've been using MalwareBytes (as suggested above) then installing Comodo Internet Security http://comodo.com/ [comodo.com] (free for personal use) if needed, and finally CCleaner from Piriform http://piriform.com/ [piriform.com] to rescue peoples PCs after disaster has struck.
I'm thinking of making it a standard "pack" of software for anyone who asks at the Library where I volunteer.
No, can't DIY for actual antivirus. But ... (Score:2)
DIY _really_ isn't an option for anti-virus. You can get some protection by having good backups, good host security such as SELinux, and maybe even a host-based IDS similar to Tripwire watching for any changes, but AV (scanning files looking for potentially malicious ones) is a big, big job. Lots of things are DIY, but AV isn't one of them.
I just started work for a company that does something related. We have a full time TEAM of people just entering new threats all day long. Another team maintains the back
Re: (Score:1)
Microsoft Security Essentials / Windows Defender has been falling behind for years now. It used to be pretty good. But now, it unfortunately doesn't catch a lot newer malware. Microsoft dropped the ball and stopped putting the proper R&D into their product.
Bitdefender Free is my new favorite these days:
http://www.bitdefender.com/sol... [bitdefender.com]
Fast, effective, and low impact. Bitdefender Free is not free for commercial use, however. And they don't have a free version that support Windows 10 yet. Bitdefende
Re: (Score:2)
The summary is a mess
Then read the effing linked Reuters article. It's pretty clear.
Anti-Virus Companies All Suck (Score:5, Insightful)
It would not surprise me if *ALL* so-called antivirus software companies did this, with very few exceptions.
Re: (Score:2)
Re: (Score:2)
It would not surprise me if *ALL* so-called antivirus software companies did this, with very few exceptions.
What ?!! don't you know that " Such actions are unethical, dishonest and their legality is at least questionable " ?
Re: Anti-Virus Companies All Suck (Score:1)
Re: (Score:2)
Finding computer virii that others don't can also be pretty suspicious. That obvious have copies of each others software and they obviously are quite capable of coding computer virii, in fact they all claim to know more about them than anyone else. So crafting one to get past the competition and infect as many computers as possible would be one of the best possible marketing strategies.
Not that I would suspect Kapersky Labs ahead of the others. I would honestly place all software security companies in th
Why would this be bad? (Score:2)
>> chief task was to reverse-engineer competitors' virus detection software to figure out how to fool them into flagging good files as malicious
Why is this a bad thing? This is pretty much what a large chunk of the "grey hatter" world does on a regular basis (figure out how to trick AV). Shouldn't we be cheering on a little AV-on-AV competition instead of letting them all group-think themselves into a pool of mediocre results?
(This is also why running different AV engines in your network has general
Re: (Score:1)
AV companies are supposed to be the "good guys" working towards "making the world a safer place". They have an image to maintain.
Their software runs with full privileges on millions of computers and is permanently connected to the Internet.
If they turn out to be your run-of-the-mill evil company run by rotten people, then how could you possibly trust them to protect you?
I don't want Kaspersky's crap anywhere near my machines if they can't even be trusted to cooperate with their own colleagues.
Re: (Score:3)
>> run-of-the-mill evil company run by rotten people
I didn't realize Symantec or Trend micros were a good companies run by nice people. Maybe McAfee could be a character witness for them. :)
>> how could you possibly trust them to protect you?
If a "security" company doesn't have the technical expertise to figure out the difference between real and fake viruses (as it seems a number of these companies couldn't), I'm not sure how much protection they're offering anyway. I guess I'd rather watch t
Re: (Score:2)
>> run-of-the-mill evil company run by rotten people
I didn't realize Symantec or Trend micros were a good companies run by nice people. Maybe McAfee could be a character witness for them. :)
>> how could you possibly trust them to protect you?
If a "security" company doesn't have the technical expertise to figure out the difference between real and fake viruses (as it seems a number of these companies couldn't), I'm not sure how much protection they're offering anyway. I guess I'd rather watch the egress traffic from the software of the the technically-savvy company than sleep knowing I got my AV software from the brightly-colored company who bought me a steak dinner at the conference.
There is no McAfee any longer. It is now Intel Security.
I actually find Bitdefender Free to be a better alternative to Micrososft's free package. It's about as light weight and finds stuff MS's misses. And it's free.
Re: (Score:2)
How dumb it would be to trust KGB guys to do anything in your computer in the first place?
"There is no such thing as a former KGB man" - V. Putin. They all cooperate with their authorities. Even if somebody would not want, they are obliged to do that if they want to do business in Russia and stay alive.
Re: (Score:2)
They have an image to maintain.
Kaspersky is run by ex-KGB men. What would possibly go wrong?
(Yeah, yeah. I know here on Slashdot the NSA and CIA are one-thousand times worse than the KGB and GRU ever were, but spare me.)
Re: (Score:2)
That was one reason I chose to use Kaspersky. Once my license expires... never again. With all the crap coming out of Russia I don't think I'd go with them again anyway. Almost all of the spam RBL hits on my mail server are from Russia, the rest are from China. I wish I could just firewall off both countries.
Re: (Score:2)
They are not simply doing research on competing AV. They were posting, anonymously, common files to blacklists like VirusTotal. They chose files that would cause the system to crash if removed. So then other AV software, that didn't know about these fake entries in the blacklist, would break people's computers. This was very sinister, and not the first time an anti-virus company has been caught proliferating damaging software. They are harming people's computers just to make their competitors look bad. It's astonishing they would do this considering how much harm they did to everyone, and how little good they did for themselves.
An OS based AV should have white list signatures for essential OS files. This attack shouldn't be a problem if the host has defense in depth.
Re: (Score:2)
>> chief task was to reverse-engineer competitors' virus detection software to figure out how to fool them into flagging good files as malicious
Why is this a bad thing? This is pretty much what a large chunk of the "grey hatter" world does on a regular basis (figure out how to trick AV). Shouldn't we be cheering on a little AV-on-AV competition instead of letting them all group-think themselves into a pool of mediocre results?
(This is also why running different AV engines in your network has generally been a good defense-in-depth measure in the past...I don't WANT them all to agree.)
Because those files belonged to end users, Kaspersky was using their competitors' software as malware.
Re:Why would this be bad? (Score:4, Insightful)
Because it's not a little AV-on-AV competition. Competition is when companies push each other to try to improve their product over the others, not purposefully throwing more hurdles in the way of the competitor.
If they did what was accused, they maliciously submitted false information that would be shared around the industry because they knew the competition would detect it as an infected file. It didn't improve Kaspersky's accuracy, nor did it help the accuracy of anyone else's scanner detecting real threats. It only resulted in competitors looking bad for false positives, and having to spend additional efforts filtering samples.
Ad blockers are the new anti-virus. (Score:1)
If you could only install one you'd be better off installing an ad blocker than an anti-virus product.
People telling you different are trying to sell you something :)
Re: (Score:2)
Re: (Score:1)
My HOSTS file is a symbolic link to my rainbow tables database of every word, ever.
Re: (Score:2)
My hosts file is a symbolic link to an image of Natalie Portman covered in hot grits, holding a copy of Lotus Notes and a machine gun.
Re: (Score:3)
Maybe they are, but I'm not seeing their messages!
FUD... (Score:2, Insightful)
... with how rotten companies are these days you can never tell if its a genuine issue or some other competitor running a smear campaign.
Either way there's no perfect AV software and as always the arms race will continue.
Re: (Score:2)
"Wow Kaspersky are fucking assholes, I'm not going to use their software anymore."
Re: (Score:3)
You are missing the point, and it was even in the article.
Those false positives occasionally led to vital Windows components being quarantined, I remember a reboot loop caused this way.
Re: (Score:1)
Antivirus software demands permission to run as root so it can properly quarantine and delete infected files that are modified or added by malicious software running as administrator (which gets that right by either manipulating the users, or a privilege escalation script). At this level of permission, no OS has OS/app separation.
Re: (Score:2)
Re: (Score:3)
Ethics? (Score:1)
"Such actions are unethical, dishonest and their legality is at least questionable."
Remember Enron? Yeah, what they did was somewhat unethical as well. Remember the subprime crisis? Plenty of ethically shady bankers in that as well. Stop pretending you care at all, because you don't. You only have to appear like you didn't know for PR reasons.
Re: (Score:3)
He may or may not know.
What is important is that he has responsibility for the actions of his company. He will need to show without a shadow of a doubt that this was a totally rogue action that was not at all encouraged by their company directives OR their culture.
It is possible that there was one guy or a group of folks who did this on their own completely against the policies and the implied culture of Kaspersky Labs. If so, then maybe he's not responsible.
However, it's hard to believe that someone woul
Absolute FUD (Score:1)
Kaspersky is one of the only anti-virus you can trust. And the best at detecting malware.
I know for certain, from a McAfee employee, that they collect info in the telemetry for NSA. This is done in the consumer's version of the software, and can be disabled only for corporations.
"Dilbert" or John Dvorak or someone else suggested (Score:1)
Anti-virus companies could (or have an incentive to) create virus-infected software and release it into the world, and then come up with detection for them faster then their competitors.
Don't recall if it was a joke, speculation, or a vague accusation, much less who made it. (It was years ago.)
So this claim seems more than a little familiar.