Categories: News

US NSA hid Spying Softwares within Hard Drive Firmware in Pakistan

The US National Security Agency (NSA) had been using a way to hide spying software deep within hard drives made by top manufacturers such as Western Digital, Seagate, Toshiba, IBM, Micron Technology Inc and Samsung Electronics Co Ltd. Western Digital, Seagate and Micron said they had no knowledge of these spying programs. Toshiba and Samsung declined to comment. IBM did not respond to requests for comment. The agency eavesdropped on both personal and government computers in many Asian countries including Pakistan for almost two decades.

Kaspersky Lab, a Moscow-based security software maker has exposed a cluster of spying programs and a series of Western cyber espionage operations. The lab found that personal computers in more than 30 countries have been infected with one or more of the spying programs with the most infections seen in Iran, Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets within countries included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists. The chart below shows a detailed view of the affected areas along with the target institutions within each country.

Kaspersky Lab has been closely monitoring more than 60 advanced security threats for several years which were responsible for cyber-attacks worldwide. Recently, they confirmed the existence of “The Equation Group” responsible for spying through hard drives for the past two decades. The Equation Group used tools that were both complicated and expensive to develop. They infected their victims, retrieved data and hid activity in an extremely professional way, and utilized classic spying techniques to deliver malicious payloads to the victims.

The spies figured out how to insert malicious software in the obscure code called firmware that launches every time a computer is turned on. Kaspersky found that they were selective about the target computers and only established full remote control over high-valued foreign computers.

The Lab did not publicly name the country behind the spying campaign but it did mention Stuxnet, the NSA-led cyber weapon which was used to attack Iran’s uranium enrichment facility. Additionally, a former NSA employee told Reuters that Kaspersky’s analysis were indeed correct while another employee confirmed that NSA had developed the technique of concealing spyware in hard drives.

Find out the details on the Malware here.

Sponsored
Sarwat Fatima

Sarwat is a journalist and DIY enthusiast. She loves writing about Startups and Businesses. She is heading Islamabad and surrounding areas for news coverage.

Share
Published by
Sarwat Fatima

Recent Posts

Telecom Operators to Automatically Restore SIMs for Tax Filers

The Federal Board of Revenue (FBR) has introduced a comprehensive mechanism for blocking and unblocking…

1 hour ago

Trump’s Influence Fuels Bitcoin to Cross $100,000

Bitcoin broke the $100,000 mark for the first time on Thursday, driven by Trump's crypto-friendly…

2 hours ago

PSX Hits New Heights, Surges by 1,800 Points to Cross 97,000

On Thursday, the Pakistan Stock Exchange (PSX) 100 Index surged by 1,781.94 points, or 1.86%,…

2 hours ago

Pakistan’s IT Minister Defends Internet Restrictions: Here’s All We Know!

Shaza Fatima Khawaja, Minister of State for IT and Telecom, made it clear on Thursday…

3 hours ago

PayPal Resolves Global Outage Impacting Thousands

PayPal, the global payment processing company, announced on Friday that it had successfully resolved a…

4 hours ago

7,300 Teaching Interns Hired Across Punjab

LAHORE: Punjab government colleges have completed the recruitment of 7,354 teaching interns. The Higher Education…

5 hours ago