Monday, January 6, 2025
HomeSecurity NewsKaspersky Lost It's Lawsuits Against U.S Government Ban For Malicious Cyber Activity...

Kaspersky Lost It’s Lawsuits Against U.S Government Ban For Malicious Cyber Activity Against the United States

Published on

Moscow based Leading cyber security Firm Kaspersky lost the lawsuits that filed to remove the ban on Kaspersky Lab products to use in the United States government computer systems.

A U.S judge has dismissed Kaspersky Lab’s lawsuit against the U.S. government’s ban so the ban will remain effect across the U.S that means no Kaspersky product will be used in any of the U.S Government agencies.

Kaspersky is Moscow, Russia Based Leading Cybersecurity Firm who Provides Many Security Products such as Anti-Virus, Internet Security, Endpoint Security, Cloud Security which claims to have 400 million users worldwide.

- Advertisement - SIEM as a Service

Kaspersky Software usually Communicate Directly into every file on the computers which Protect them and it keeps communicate with Kaspersky Labs To receive Updates about new threads as like any other Anti-Virus Softwares Does.

Last year September US Government Decide to Bans all the Kaspersky Security Software Products that being used by United States federal agencies since a lot of Spying Activity Controversy against the Kaspersky Products.

But Kaspersky Labs Founder and CEO Eugene Kaspersky Strongly Deny this Allegation against his company as completely False and there is no Public Evidence.

Later on, Kaspersky lab filed the lawsuits as part of a campaign to refused the allegations against U.S. government bans on its products.

Judge Dismiss the Lawsuits – Kaspersky ban

Kollar-Kotelly, U.S. District Judge for the District of Columbia wrote Kaspersky had failed to show that Congress violated constitutional prohibitions on legislation that “determines guilt and inflicts punishment” without the protections of a judicial trial.

In this case, The basis of Kaspersky’s lawsuit was that the bans were unconstitutional and caused undue harm to the company. The judge disagreed with that assertion.

Also, she Wrote in the order, “To ‘sell’ requires another to ‘buy.’ Because no government agency would buy Plaintiffs’ product in the period before October 1, 2018, Plaintiffs’ theoretical ‘right’ to sell has no value at all in the real world.”

Kaspersky Lab Statement

“Kaspersky Lab is disappointed with the court’s decisions on its constitutional challenges to the US government prohibitions on the use of its products and services by federal agencies. We will vigorously pursue our appeal rights. Kaspersky Lab maintains that these actions were the product of unconstitutional agency and legislative processes and unfairly targeted the company without any meaningful fact finding.

Given the lack of evidence of wrongdoing by the company and the imputation of malicious cyber activity by nation-states to a private company, these decisions have broad implications for the global technology community. Policy prohibiting the US government’s use of Kaspersky Lab products and services actually undermines the government’s expressed goal of protecting federal systems from the most serious cyber threats.

“We are fully transparent regarding our methods of work and through our Global Transparency Initiative, we invite concerned parties to review our various code bases, how we will create software updates and detection rules and how we will process customer data from North America and Europe, all verified by an independent third party.

“Kaspersky Lab strongly believes that open dialogue and cooperation can help all the parties to move forward and find the best ways to strengthen national and global cybersecurity policy and best practices. We believe that our expertise and threat intelligence makes the cyber world a safer place as we detect and neutralize all forms of advanced persistent threats, regardless of their origin or purpose.”

Also Read:

Trump Signs Bill Banning on the Kaspersky Security Products from use of US Government

Kaspersky Lab Investigation Says the NSA Contractor Computer Already Infected with Huge Number Malware

Israel Hacked Kaspersky to Caught Russian Spies Who Stolen NSA Cyber Weapons

Russian Hackers Stole NSA Hacking Tools Using Kaspersky Software

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

North Korean Hackers Wipe Cryptocurrency Wallets via Fake Job Interviews

Cybersecurity experts have uncovered a new wave of cyberattacks linked to North Korean threat...

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

North Korean Hackers Stolen $2.2 Billion From Crypto Platforms In 2024

Cryptocurrency hacking incidents in 2024 surged 21.07% YoY to $2.2 billion, with 303 breaches...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...