Friday, February 7, 2025
HomeSecurity NewsKaspersky Lost It's Lawsuits Against U.S Government Ban For Malicious Cyber Activity...

Kaspersky Lost It’s Lawsuits Against U.S Government Ban For Malicious Cyber Activity Against the United States

Published on

SIEM as a Service

Follow Us on Google News

Moscow based Leading cyber security Firm Kaspersky lost the lawsuits that filed to remove the ban on Kaspersky Lab products to use in the United States government computer systems.

A U.S judge has dismissed Kaspersky Lab’s lawsuit against the U.S. government’s ban so the ban will remain effect across the U.S that means no Kaspersky product will be used in any of the U.S Government agencies.

Kaspersky is Moscow, Russia Based Leading Cybersecurity Firm who Provides Many Security Products such as Anti-Virus, Internet Security, Endpoint Security, Cloud Security which claims to have 400 million users worldwide.

Kaspersky Software usually Communicate Directly into every file on the computers which Protect them and it keeps communicate with Kaspersky Labs To receive Updates about new threads as like any other Anti-Virus Softwares Does.

Last year September US Government Decide to Bans all the Kaspersky Security Software Products that being used by United States federal agencies since a lot of Spying Activity Controversy against the Kaspersky Products.

But Kaspersky Labs Founder and CEO Eugene Kaspersky Strongly Deny this Allegation against his company as completely False and there is no Public Evidence.

Later on, Kaspersky lab filed the lawsuits as part of a campaign to refused the allegations against U.S. government bans on its products.

Judge Dismiss the Lawsuits – Kaspersky ban

Kollar-Kotelly, U.S. District Judge for the District of Columbia wrote Kaspersky had failed to show that Congress violated constitutional prohibitions on legislation that “determines guilt and inflicts punishment” without the protections of a judicial trial.

In this case, The basis of Kaspersky’s lawsuit was that the bans were unconstitutional and caused undue harm to the company. The judge disagreed with that assertion.

Also, she Wrote in the order, “To ‘sell’ requires another to ‘buy.’ Because no government agency would buy Plaintiffs’ product in the period before October 1, 2018, Plaintiffs’ theoretical ‘right’ to sell has no value at all in the real world.”

Kaspersky Lab Statement

“Kaspersky Lab is disappointed with the court’s decisions on its constitutional challenges to the US government prohibitions on the use of its products and services by federal agencies. We will vigorously pursue our appeal rights. Kaspersky Lab maintains that these actions were the product of unconstitutional agency and legislative processes and unfairly targeted the company without any meaningful fact finding.

Given the lack of evidence of wrongdoing by the company and the imputation of malicious cyber activity by nation-states to a private company, these decisions have broad implications for the global technology community. Policy prohibiting the US government’s use of Kaspersky Lab products and services actually undermines the government’s expressed goal of protecting federal systems from the most serious cyber threats.

“We are fully transparent regarding our methods of work and through our Global Transparency Initiative, we invite concerned parties to review our various code bases, how we will create software updates and detection rules and how we will process customer data from North America and Europe, all verified by an independent third party.

“Kaspersky Lab strongly believes that open dialogue and cooperation can help all the parties to move forward and find the best ways to strengthen national and global cybersecurity policy and best practices. We believe that our expertise and threat intelligence makes the cyber world a safer place as we detect and neutralize all forms of advanced persistent threats, regardless of their origin or purpose.”

Also Read:

Trump Signs Bill Banning on the Kaspersky Security Products from use of US Government

Kaspersky Lab Investigation Says the NSA Contractor Computer Already Infected with Huge Number Malware

Israel Hacked Kaspersky to Caught Russian Spies Who Stolen NSA Cyber Weapons

Russian Hackers Stole NSA Hacking Tools Using Kaspersky Software

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Former Google Engineer Charged for Allegedly Stealing AI Secrets for China

A federal grand jury has indicted Linwei Ding, also known as Leon Ding, a...

Dell Update Manager Plugin Flaw Exposes Sensitive Data

Dell Technologies has issued a security advisory (DSA-2025-047) to address a vulnerability in the Dell Update...

DeepSeek iOS App Leaks Data to ByteDance Servers Without Encryption

DeepSeek iOS app—a highly popular AI assistant recently crowned as the top iOS app...

Critical Flaws in HPE Aruba ClearPass Expose Systems to Arbitrary Code Execution

Hewlett Packard Enterprise (HPE) has issued a high-priority security bulletin addressing multiple vulnerabilities in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...

Google Blocks 2.28 Million Malicious Apps from Play Store in Security Crackdown

In a continued commitment to enhancing user safety and trust, Google has outlined significant...

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...