Home Security Kaspersky may be collateral damage in US-Russia stoush

Kaspersky may be collateral damage in US-Russia stoush

Kaspersky may be collateral damage in US-Russia stoush Featured

Kaspersky Lab may have been targeted by the US government as part of retaliatory measures taken by the Obama administration after it allegedly discovered that Russia had made plans to influence the 2016 US elections.

A detailed report in the Washington Post outlined what it claimed was the process whereby the US administration became aware of alleged Russian plans.

It said then President Barack Obama was reluctant to make a noise about it as it might look as though he was doing to to try and swing the election to the Democrats.

The Trump administration is reviewing if it should keep using Kaspersky's anti-malware software, with unsubstantiated claims floating around to the effect that Russia is using the software to spy on the US.

The Post report said that there was a move by the Obama team to take covert action to indicate to Russia that the kind of alleged meddling taking place would not go unpunished. Plans were thus devised to hit various sectors of the Russian economy.

"One preliminary suggestion called for targeting technology companies including Kaspersky Lab, the Moscow-based cyber security firm," the Post said.

"But sceptics worried that the harm could spill into Europe and pointed out that US companies used Kaspersky systems and software."

Eugene Kaspersky, who was recently in Australia, told iTWire at the time that he had no idea why his company was being targeted by the US government.

"I have no insider knowledge, but it seems it's a result of current crisis in relations between Russia and the US," he said in response to queries.

"There could be some grudge because we've unearthed many different advanced attacks and threat actors speaking all sorts of languages including English (and Russian and Chinese and many more, but those with a grudge probably don't care).

"And third, someone may be unhappy with our market success (and) might be using the moment to hit us."


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Ransomware attacks on businesses and institutions are now the most common type of malware breach, accounting for 39% of all IT security incidents, and they are still growing.

Criminal ransomware revenues are projected to reach $11.5B by 2019.

With a few simple policies and procedures, plus some cutting-edge endpoint countermeasures, you can effectively protect your business from the ransomware menace.


Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.


Popular News