Click to Skip Ad
Closing in...

One of NSA’s most precious spying tools was just uncovered

Published Feb 17th, 2015 6:50AM EST
BGR

If you buy through a BGR link, we may earn an affiliate commission, helping support our expert product labs.

Spy agencies have some very smart tools at their disposal for their surveillance and data gathering operations, many leaks have revealed so far, but Russian security agency Kaspersky Lab has uncovered one of the most important such cyber weapon available to the NSA, Reuters reports. According to the company, a country which it decided not to identify, but which the publication confirmed to be the U.S., has been able to sneak malware in a critical part of a computer, which practically made it possible not only to spy on a variety of targets with ease, but also bypass any security measures, and reinfect the machines over and over.

FROM EARLIER: The largest bank robbery ever: up to $900M possibly stolen, and no need for a getaway car

Apparently, the NSA managed to create a smart virus that can hide in a hard drive’s own firmware that boots up when the PC is turned on. Regular anti-virus programs would not discover the infection, and computers with such drives inside would offer a treasure trove of information to the spy agency controlling them.

According to a former intelligence operative, the NSA did indeed develop the technology, which is valued “as highly as Stuxnet.”

Reuters further reveals that disk drive firmware is viewed by spies and cybersecurity experts as “the second-most valuable real estate on a PC for a hacker, second only to the BIOS code invoked automatically as a computer boots up.”

Drives from multiple companies have been found to contain the virus, including Western Digital, Seagate, Toshiba, IBM, Micro Technology and Samsung. Of those, Western Digital, Seagate and Micron said they have no knowledge of the matter, while Toshiba and Samsung did not comment.

According to Kaspersky, getting the malicious code into a drive’s firmware is not an easy task, and can’t be done with help of public tools, meaning that the NSA had to have access to source codes for hard drives produced by these companies.

Chris Smith Senior Writer

Chris Smith has been covering consumer electronics ever since the iPhone revolutionized the industry in 2008. When he’s not writing about the most recent tech news for BGR, he brings his entertainment expertise to Marvel’s Cinematic Universe and other blockbuster franchises.

Outside of work, you’ll catch him streaming almost every new movie and TV show release as soon as it's available.