The Swiss Intelligence Leak: Former NDB Officer Transmitted Classified Information to Russia via Kaspersky

Swiss intelligence leak

A former Swiss Intelligence officer leaked classified NATO and cybersecurity data to Russia via Kaspersky between 2015 and 2020.

A former officer of Switzerland’s Federal Intelligence Service (FIS) is under investigation for having passed classified data to Russian intelligence, including the GRU. Holding a cybersecurity role with broad access rights, he allegedly copied sensitive files without authorization over several years. The Office of the Attorney General confirmed the leaked documents pertained to NATO cooperation, counterterrorism, and internal cybersecurity operations. The suspect reportedly acted alone, driven by ideology rather than financial gain. According to Swiss public broadcaster SRF, the leak occurred between 2015 and 2020 via the Russian cybersecurity company Kaspersky. The firm, whose European HQ is in Zurich, has faced similar accusations in the past. Several countries have restricted or banned the use of its services.

Analysis by Steven MEYER, Co-CEO of ZENDATA Cybersecurity:

Allegations against Kaspersky are nothing new—and as usual, hard evidence is missing. The case is complex, but we no longer recommend their products in Europe. Their tech is good, their engineers excellent, and pricing competitive. But it’s a Russian tool, founded by someone who worked for the Russian government and must comply with Russian laws.

Malware operates stealthily and is hard to detect. EDR cybersecurity solutions, which are replacing traditional antivirus, need full access to machines to detect and stop threats. This breach highlights internal monitoring failures, particularly involving privileged accounts. The suspect’s technical profile enabled long-term undetected data exfiltration. The absence of automated alerts or access reviews exposed the weak detection of insider threats.

This incident goes beyond Switzerland: it reflects a global challenge within intelligence services, balancing operational agility with strict access control.

The case underscores the need for continuous access rights monitoring, especially for technical profiles mixing IT admin roles with access to sensitive data.

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

eSIM hacking

eSIM Cloning via Java Card Flaws: A Hidden Threat Returns

Bluetooth Vulnerability Exposes Millions of Cars to Hackers

Critical Bluetooth Vulnerability Could Let Hackers Remotely Control Cars

McDonald’s AI bot exposed job applicant

McDonald’s AI Job Bot Leaks Candidate Data