Professional Documents
Culture Documents
Cyber-Security - The Kaspersky Equation - The Economist
Cyber-Security - The Kaspersky Equation - The Economist
Cyber-Security - The Kaspersky Equation - The Economist
Cybersecurity
The Kaspersky equation
A Russian antivirus firm impresses the sceptics, again
Feb 21st 2015 | From the print edition
However, Kaspersky Lab has repeatedly impressed sceptics by exposing genuine and serious
cybersecurity problems. In 2010, for instance, it helped uncover Stuxnet, a computer worm
designed to sabotage the Iranian nuclear programme.
On February 16th Kaspersky appeared to repeat this feat, not once, but twice. First it released
a report detailing how a gang it calls Carbanak had hacked the computer systems of banks
around the world. It said the gang had stolen several hundred million dollars by moving
money to fake accounts and making cash machines dispense their contents. The same day
the firm said it had discovered the “Equation Group”, apparently part of the NSA, which it
said was able to embed spyware in computers that gives it total control over them, even after
http://www.economist.com/node/21644154/print 1/2
23/02/2015 Cybersecurity: The Kaspersky equation | The Economist
the hard disk has been erased and the operating system reinstalled.
For all the firm’s expertise and commercial success, questions linger over whether the
Kremlin would be able to resist exerting some control over a Russian firm in such a sensitive
line of business. The company insists its home government is just another customer and that
it cooperates with it no differently from the way it does with other governments. The
financial information it releases is limited. It had plans to go public shortly before the global
financial crisis, but now it intends to stay private (Mr Kaspersky is majority shareholder).
Being private allows it to be more flexible and pursue “visionary projects”, he says.
Some computersecurity firms cry wolf to attract attention; Kaspersky’s wolves have often
proved to be real. Indeed, there is a thread between its two latest revelations, says Bruce
Schneier, a cybersecurity analyst. “Today’s topsecret programmes,” he writes, “become
tomorrow’s PhD theses and next day’s hacker tools.” In other words, what the NSA does now,
criminals will eventually copy.
http://www.economist.com/node/21644154/print 2/2