
As initially reported on The Intercept, GCHQ (the UK Governments equivalent of the NSA) and the NSA were able to hack Kaspersky Software’s ant-virus software to track users and infiltrate networks. This information comes directly from documents released by Edward Snowden.
The hacked software was then used to monitor email and web traffic to obtain intelligence. The most interesting part of this story from BlackFog’s perspective is the way the software was hacked was to monitor the traffic originating from the end users computer and Kaspersky servers. Most anti-virus tools collect a lot of information on your computer and send it back to their central servers. This information contains uniquely identifiable data that can be used to track exactly who this user is and what they are up to.
Rest assured, this is precisely why BlackFog does not collect information on your computer and send it back to our networks and one of the founding principles we use to keep your computer secure.
For a more detailed report on this privacy breach please refer to the article below.
Click here for the full article as reported on The Intercept.
Related Posts
BlackFog Awarded 2025 MSP Today Product of the Year
BlackFog ADX wins 2025 MSP Today Product of the Year, recognizing its leadership in ransomware prevention and anti-data exfiltration.
Data Splicing vs. Traditional DLP: The New Threat for Enterprises
Explore how data splicing attacks bypass traditional DLP solutions and why ADX, with its real-time endpoint monitoring and AI based threat analysis, offers a powerful defense against advanced data exfiltration techniques.
Data Backup and Data Recovery: What Every Business Needs to Know
Understand these critical data backup and data recovery steps to reduce the risk of lengthy downtime following data loss.
DNS Exfiltration: How Hackers Use Your Network to Steal Data Without Detection
Learn how DNS exfiltration works and why this method of data theft often goes undetected.
How Do You Protect Yourself From Hackers? Proactive Strategies for Business Data Security
Follow these advanced data protection strategies to help protect your firm from hackers in an increasingly challenging environment.
5 Steps to a Disaster Recovery Plan That Protects Your Business
Follow these key steps to develop a data backup and recovery plan fit for the digital-first world.