Feeds

Kaspersky plays down source-code leak

Stolen, obsolete code has no effect on protection

Using blade systems to cut costs and sharpen efficiencies

Leaked versions of source code for older versions of Kaspersky Lab's security software have been released through file-sharing networks over the last few days.

The source code comes from early 2008 versions of the consumer version of Kaspersky's security suite, which included anti-virus, anti-spam and parental control features. The beta code was originally swiped by a corrupt employee who tried to sell the technology prior to being arrested and convicted for intellectual property theft.

The source code is outdated and incomplete but may still provide clues to less than ethical second and third tier security firms on how to go about improving their products. The code – which previously appeared on online hacking forums back in November – is now far more accessible following its availability through BitTorrent and other file-sharing networks. It seems unlikely that the code would tell cybercrooks anything they didn't already know or provide much help in working ways around Kaspersky's security defences. More skilled and well-resourced virus writers commonly test their creations against a range of anti-virus tools prior to their release. Source code analysis doesn't figure in this process.

Kaspersky is playing down the significance of the incident. The antivirus software developer released this statement:

On 27 January 2011, Kaspersky Lab became aware that some parts of the source code for the company’s older (2008) range of products was illegally released on the internet.

After extensive checks, Kaspersky Lab specialists found links with an incident in early 2008 in which a former employee, who had access to the source code for the Company’s 2008 range of home user products, announced that the code could be bought over the internet. The matter was quickly referred to the relevant law enforcement agencies and the ex-employee was apprehended. The culprit was later found guilty by a Moscow district court under Article 183 of the Russian Federation Criminal Code and received a three-and-a-half-year suspended sentence.

Kaspersky said the source code released on BitTorrent had already been released through underground forums. The wider availability of the code poses no risk, the developer said.

Kaspersky Lab reiterates that this incident cannot harm users of its products, solutions and services in any way. The stolen source code is related to one of the previous product lineups, and since then the company has renewed all key protection technologies. The stolen code represents a very small part of the modern product source code, and is not related to protection functionality. It also contains fragments of an obsolete version of the Kaspersky anti-virus engine, which has been radically redesigned and updated since the source code was stolen. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.