Tuesday, February 25, 2025
HomeSecurity NewsKaspersky Lost It's Lawsuits Against U.S Government Ban For Malicious Cyber Activity...

Kaspersky Lost It’s Lawsuits Against U.S Government Ban For Malicious Cyber Activity Against the United States

Published on

SIEM as a Service

Follow Us on Google News

Moscow based Leading cyber security Firm Kaspersky lost the lawsuits that filed to remove the ban on Kaspersky Lab products to use in the United States government computer systems.

A U.S judge has dismissed Kaspersky Lab’s lawsuit against the U.S. government’s ban so the ban will remain effect across the U.S that means no Kaspersky product will be used in any of the U.S Government agencies.

Kaspersky is Moscow, Russia Based Leading Cybersecurity Firm who Provides Many Security Products such as Anti-Virus, Internet Security, Endpoint Security, Cloud Security which claims to have 400 million users worldwide.

Kaspersky Software usually Communicate Directly into every file on the computers which Protect them and it keeps communicate with Kaspersky Labs To receive Updates about new threads as like any other Anti-Virus Softwares Does.

Last year September US Government Decide to Bans all the Kaspersky Security Software Products that being used by United States federal agencies since a lot of Spying Activity Controversy against the Kaspersky Products.

But Kaspersky Labs Founder and CEO Eugene Kaspersky Strongly Deny this Allegation against his company as completely False and there is no Public Evidence.

Later on, Kaspersky lab filed the lawsuits as part of a campaign to refused the allegations against U.S. government bans on its products.

Judge Dismiss the Lawsuits – Kaspersky ban

Kollar-Kotelly, U.S. District Judge for the District of Columbia wrote Kaspersky had failed to show that Congress violated constitutional prohibitions on legislation that “determines guilt and inflicts punishment” without the protections of a judicial trial.

In this case, The basis of Kaspersky’s lawsuit was that the bans were unconstitutional and caused undue harm to the company. The judge disagreed with that assertion.

Also, she Wrote in the order, “To ‘sell’ requires another to ‘buy.’ Because no government agency would buy Plaintiffs’ product in the period before October 1, 2018, Plaintiffs’ theoretical ‘right’ to sell has no value at all in the real world.”

Kaspersky Lab Statement

“Kaspersky Lab is disappointed with the court’s decisions on its constitutional challenges to the US government prohibitions on the use of its products and services by federal agencies. We will vigorously pursue our appeal rights. Kaspersky Lab maintains that these actions were the product of unconstitutional agency and legislative processes and unfairly targeted the company without any meaningful fact finding.

Given the lack of evidence of wrongdoing by the company and the imputation of malicious cyber activity by nation-states to a private company, these decisions have broad implications for the global technology community. Policy prohibiting the US government’s use of Kaspersky Lab products and services actually undermines the government’s expressed goal of protecting federal systems from the most serious cyber threats.

“We are fully transparent regarding our methods of work and through our Global Transparency Initiative, we invite concerned parties to review our various code bases, how we will create software updates and detection rules and how we will process customer data from North America and Europe, all verified by an independent third party.

“Kaspersky Lab strongly believes that open dialogue and cooperation can help all the parties to move forward and find the best ways to strengthen national and global cybersecurity policy and best practices. We believe that our expertise and threat intelligence makes the cyber world a safer place as we detect and neutralize all forms of advanced persistent threats, regardless of their origin or purpose.”

Also Read:

Trump Signs Bill Banning on the Kaspersky Security Products from use of US Government

Kaspersky Lab Investigation Says the NSA Contractor Computer Already Infected with Huge Number Malware

Israel Hacked Kaspersky to Caught Russian Spies Who Stolen NSA Cyber Weapons

Russian Hackers Stole NSA Hacking Tools Using Kaspersky Software

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...

Malicious npm Package Targets Developers for Supply Chain Attack

The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...