Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/29/2017
06:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Kaspersky Lab Faces More U.S. Scrutiny Over Potential Russian Govt. Influence

Lawmaker proposes ban on DoD use of Moscow-based security vendor's products.

Moscow-based Kaspersky Lab this week found itself the subject of escalating concerns about the company's possible connections with the Russian government.

The immediate worries this time were prompted by news that FBI agents had questioned several of the security vendor's US-based employees at or near their residences Tuesday night.

The employees were apparently informed they were not the subjects of any formal criminal investigation and that they were being interviewed as part of an effort to get general information about the company's operations and communications with Moscow.

It is unclear at this time if the questioning had anything to do with Special Counsel Robert Mueller's broader investigation into potential Russian interference in the U.S. elections last year.

News of the FBI's apparent investigation of Kaspersky's activities prompted U.S. Senator Jeanne Shaheen [D-NH] to propose a total ban on the Pentagon's use of Kaspersky's products. In an amendment Wednesday to a Senate Armed Services Committee defense spending policy bill, Shaheen said the prohibition was required because of reports that Kaspersky Lab "might be vulnerable to Russian government interference."

A Kaspersky Lab spokeswoman said neither the company nor its founder and CEO Eugene Kaspersky had any ties to any government. "The company has never helped, nor will help, any government in the world with any cyber espionage efforts," the spokeswoman said in a statement to Dark Reading.

Kaspersky Lab has been an IT security vendor for 20 years and has adhered to ethical practices. "Kaspersky Lab believes it is completely unacceptable that the company is being unjustly accused without any hard evidence to back up these false allegations," the statement said.

John Pescatore, director of emerging security threats at the SANS Institute and a former NSA analyst says that so far at least there indeed doesn't appear to be any credible evidence that Kaspersky Lab's products have been compromised or contain hidden doors. "NSA and the UK GCHQ have had many years to look at Kaspersky’s products and I've seen no warnings before this," Pescatore says.

At the same time though, there's little doubt that Russian intelligence agencies are just as interested as the NSA in exploiting cyber techniques to infiltrate other countries.

"NSA knew of vulnerabilities in US security products and told no one. Russia may have known of similar vulnerabilities in Kaspersky's products and told no one," he says.

Just as the NSA might have influenced U.S. technology vendors to leave vulnerabilities in their products, the Russian government could have done the same with Kaspersky. "Russia went further, in economic espionage and trying to influence our presidential election, but there are many other similarities."

The takeaway for organizations is that all software needs to be checked for vulnerabilities and malicious capabilities, he said.

This week's developments add to the pressure that the $620 million Kaspersky Lab has been under in recent years about possible links with the Russian government and intelligence agencies. The company's products are relatively widely used in the US by consumers, commercial entities, and government organizations.

In May, U.S. intelligence officials said they were investigating the government's use of Kaspersky Lab products and whether those products could be used to attack American systems. At a U.S. Senate Select Committee on Intelligence hearing on Russian interference, the U.S. director of national intelligence and other intelligence officials unanimously expressed discomfort about US Kaspersky Lab products on their computers without explaining why. That time, as now, Kaspersky denied the company had any links with the Russian government and suggested it was being picked on for political reasons.

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada, July 22-27, 2017. Click for information on the conference schedule and to register.

Related content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.