The first consists of traditional defensive techniques, including rerouting malicious traffic to servers that can harmlessly absorb it. A person familiar with the company’s anti-DDoS system says it’s made up of two parts. In this case, Kaspersky may have been referring to something even more rare in the security world. “Active countermeasures” is a term of art among security professionals, often referring to hacking the hackers, or shutting down their computers with malware or other tricks. The project includes both technology to protect against attacks (filters) as well as interaction with the hosters (‘spreading’ of sacrifice) and active countermeasures (about which, we keep quiet) and so on. Bloomberg quoted a snippet of that email: The project reportedly became the basis of Kaspersky’s anti-DDoS technology. The “active countermeasures” were to be kept a secret. Besides blocking DDoS attacks, Kaspersky allegedly agreed help ISPs locate the attackers. The article says Kaspersky confirmed the emails are authentic, while Kaspersky claims it confirmed no such thing.īloomberg claims that in the email, Kaspersky discusses an anti-DDoS attack software project undertaken per a request by the FSB (Russia’s main intelligence agency). One of Bloomberg’s bigger claims comes from a 2009 email thread between Eugene Kaspersky and senior staff. intelligence agencies that Kaspersky Lab products might have hidden backdoors aka “might be vulnerable to Russian government influence.” This was in response to the continued suspicions by some U.S. A week ago, Kaspersky offered to disclose its source code for the U.S.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |