small-logo
ProfessionalsCapabilitiesInsights & NewsCareersLocations
About UsAlumniOpportunity & InclusionPro BonoCorporate Social Responsibility
Stay Connected:
facebookinstagramlinkedintwitteryoutube
  1. Privacy & Data Security

Blog

Russian Hackers Reportedly Stole NSA Data from a Contractor’s Computer

  • PDFPDF
    • Email
    • LinkedIn
    • Facebook
    • Twitter
    Share this page
  • PDFPDF
    • Email
    • LinkedIn
    • Facebook
    • Twitter
    Share this page

Blog

Russian Hackers Reportedly Stole NSA Data from a Contractor’s Computer

  • PDFPDF
    • Email
    • LinkedIn
    • Facebook
    • Twitter
    Share this page

1 Min Read

Related Locations

Chicago

Related Topics

Data Breach

Related Capabilities

Privacy & Data Security

October 10, 2017

Last week, The Wall Street Journal reported that Russian hackers stole National Security Agency (NSA) data after an NSA contractor put highly-classified information on his home computer. According to the WSJ article, “NSA Contractor’s Breach of Cybersecurity Protocol at Heart of Russian Hack,” hackers identified and then targeted NSA files on the contractor’s personal computer by exploiting vulnerabilities in the antivirus software used by the contractor. Notably, given concerns about the particular version of antivirus software used by the contractor, last month the Department of Homeland Security banned all U.S. government departments and agencies from using it.

The stolen data purportedly included details about the NSA’s spying and cyber-defense tactics. Although the NSA has not disclosed or confirmed that the theft occurred, the WSJ reports that the theft “is considered by experts to be one of the most significant security breaches in recent years.” This theft would be the third publicly-known data breach of NSA data stemming from a contractor’s access to classified documents. 

TIP: Even companies that have strong data protection measures are vulnerable to—and therefore must carefully protect against—data loss that arises through its contractors, vendors, and other third-parties with access to the company’s networks. 

Related Professionals

Related Professionals

Steven Grimes

Steven Grimes

This entry has been created for information and planning purposes. It is not intended to be, nor should it be substituted for, legal advice, which turns on specific facts.

Logo
facebookinstagramlinkedintwitteryoutube

Copyright © 2025. Winston & Strawn LLP

AlumniCorporate Transparency Act Task ForceDEI Compliance Task ForceEqual Rights AmendmentLaw GlossaryThe Oval UpdateWinston MinutePrivacy PolicyCookie PolicyFraud & Scam AlertsNoticesSubscribeAttorney Advertising