symantec and kaspersky knew about reign and kept quiet

Discussion in 'other security issues & news' started by zfactor, Dec 2, 2014.

  1. zfactor

    zfactor Registered Member

    Joined:
    Mar 10, 2005
    Posts:
    6,102
    Location:
    on my zx10-r
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    Great. Av companies keeping quiet. I wonder how they would explain infections to their customers if any of them was attacked.
     
  3. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    When asked before if they'd detect government malware, they claimed that they would.
     
  4. guest

    guest Guest

    I'm not surprised at all with Symantec, but Kaspersky? Unless of course... :eek:

    They would... miss. :argh:
     
  5. vojta

    vojta Registered Member

    Joined:
    Feb 26, 2010
    Posts:
    830
    Symantec uncovered Reign after investigating it during several months. That's the true story, even if you like to tell a different one.
     
  6. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    Their customers get infected with non-government malware in spite of "AV protection". It would just be another missed detection.

    The question of whether they're unwilling or unable to detect government malware is moot. The simple fact is that normal commercial malware regularly defeats AVs. Why would anyone expect better against government malware? IMO, AVs aren't worth the disk space that they consume.
     
  7. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    Not if they admit to knew about it and decided to look away. If I were a customer, and got hit by this malware, while my AV didn't want to block it (although I'm paying them to protect me), I wouldn't be too happy.
     
  8. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    If it ever did come down to a legal battle, I'd bet on the government giving them immunity, just like they did the telecoms. Besides, it's a safe bet that Symantec and Kaspersky aren't the only ones that knew and turned a blind eye.

    There a very clear lesson here. If your adversary is a 3-letter agency or a government, you can't trust corporations to defend you. Except for others who are of the same mind, you're on your own.
     
  9. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
  10. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    I can't find any information about their software detecting the samples that they've found. Even if they didn't fully research malware, did they block samples and pieces they already knew about?
     
  11. anon

    anon Registered Member

    Joined:
    Dec 27, 2012
    Posts:
    7,982
  12. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
  13. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    Quite the game with words:
    This is what they call the "least untrue statement". Just because the product is designed to detect it doesn't mean that they'll add the detection, at least not for the common user. Years later they get around to adding detections for it, after it's done its job. So much for cloud AVs and rapid updating.
     
  14. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From Corporate Abuse of Our Data:
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.