https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2023 MSP 501 Application
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2023 MSP 501 Application
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Security


Partners Could Feel Impact With Kaspersky Lab Caught in USRussia Cyber Beef

Partners Could Feel Impact With Kaspersky Lab Caught in U.S.-Russia Cyber Beef

  • Written by Aldrin Brown
  • July 18, 2017
The endpoint security vendor sought to respond this week, after the latest in a barrage of negative media reports questioning whether the company's ties to the Russian government present a cyber security threat for western users of its products.

Partner IT services provider partners could be left in a lurch as Kaspersky Lab appears to be paying the price for Vladamir Putin’s cyber campaign against the 2016 American presidential election, with the security software vendor this week losing key approvals to sell IT products to U.S. government agencies.

If significant European Union nations follow suit, damage to the 20-year-old cyber security innovator will be much more than reputational.

Nearly 60 percent – $374 million – of Kaspersky ’s $633 million in 2016 revenue was earned in the U.S. and Western Europe, according to a recent article in Bloomberg Business.

The Bloomberg Business article was just the latest in a barrage of negative western media coverage about the Moscow-based company, most of it focusing on U.S. intelligence agencies’ growing leeriness about Kaspersky’s connections to the Russian government.

Updated: In a July 17 statement to MSPmentor, Kaspersky Lab said:

“Kaspersky Lab, a private company, seems to be caught in the middle of a geopolitical fight where each side is attempting to use the company as a pawn in their political game…Kaspersky Lab continues to be available to assist all concerned government organizations with any investigations, and the company ardently believes a deeper examination of Kaspersky Lab will confirm that these allegations are unfounded.”

In recent weeks, FBI agents visited Kaspersky’s U.S. employees to ask questions about the ability to access U.S. data from Russia, among other things.

This week’s decision by the U.S. General Services Administration to drop Kaspersky Lab from the list of approved vendors of IT services and digital photo products makes it much more difficult for managed services providers (MSPs) and value-added resellers (VARs) to sell Kaspersky products to federal government agencies – the vendor’s single biggest customer.

That could impact IT services providers who partner with Kaspersky to sell endpoint security products to the U.S. government or to other NATO governments that could become equally skittish and follow the American example.

U.S. intelligence agencies concede they don’t have evidence that Kaspersky products have been used in cyber attacks against the U.S. or anyone else.

For it’s part, Kaspersky Lab has vowed complete transparency, saying it would be willing to testify before skeptical U.S. Congressional committees and even turn over the complete source code to the U.S. government.

Kaseya, one of the major toolmakers of MSP toolsets and a Kaspersky partner, publicly voiced support and said it intends to continue the relationship.

Still, the suspicions by American authorities remain.

In response to allegations in this week’s Bloomberg Business article, Kaspersky Lab issued a point-by-point rebuttal to the allegations.

Following is the complete text:

Kaspersky Lab response clarifying the inaccurate statements published in a Bloomberg Businessweek article on July 11, 2017:

“Regardless of how the facts are misconstrued to fit in with a hypothetical, false theory, Kaspersky Lab, and its executives, do not have inappropriate ties with any government. The company does regularly work with governments and law enforcement agencies around the world with the sole purpose of fighting cybercrime.   

“In the internal communications referenced within the recent article, the facts are once again either being misinterpreted or manipulated to fit the agenda of certain individuals desperately wanting there to be inappropriate ties between the company, its CEO and the Russian government, but no matter what communication they claim to have, the facts clearly remain there is no evidence because no such inappropriate ties exist.”

Below, the false allegations and inaccurate representations included in the article are addressed, point by point:

1.    “The huge reach of Kaspersky’s technology is partly the result of licensing agreements that allow customers to quietly embed the software in everything from firewalls to sensitive telecommunications equipment—none of which carry the Kaspersky name.”

Kaspersky Lab has technology licensing agreements with more than 120 technology providers. The licensing agreements permit these partners to embed Kaspersky Lab’s unparalleled anti-malware engine into their own solutions, and once Kaspersky Lab products are included, these vendors are responsible for publicly communicating all the external products used in their comprehensive offering. It is also important to note that less than four percent of the company’s revenue comes from licensing deals.

Examples of our partners providing the full information about security solutions they are using in their offerings are included in their technical documents and/or on their websites: examples – ZyXEL and Juniper Networks. 

  1.     “While the U.S. government hasn’t disclosed any evidence of the ties, internal company emails obtained by Bloomberg Businessweek show that Kaspersky Lab has maintained a much closer working relationship with Russia’s main intelligence agency, the FSB, than it has publicly admitted.”

Actually, the reported emails show no such link, as the communication was misinterpreted or manipulated to try to make the media outlet’s narrative work. Kaspersky Lab is very public about the fact that it assists law enforcement agencies around the world with fighting cyberthreats, including those in Russia, by providing cybersecurity expertise on malware and cyberattacks.

Kaspersky Lab regularly cooperates with law enforcement agencies, industry peers and victims of cybercrime. For example, in the past, we have assisted law enforcement efforts to arrest the Lurk gang, which stole $45 million from banks and other financial institutions. Similarly, Kaspersky Lab assisted the Dutch police in identifying and catching the authors of the CoinVault ransomware. The majority of the CoinVault victims have been registered in the Netherlands, Germany, U.S., France and the UK. The company’s goal is very simple – protect users from cyberthreats and make the internet safer for everyone. 

Other examples of Kaspersky Lab cooperation with international law enforcement agencies are:

  • Simda botnet disruption
  • Shylock financial botnet disruption
  •     “It has developed security technology at the spy agency’s behest and worked on joint projects the CEO knew would be embarrassing if made public.”

It’s important to be clear, the company never received a request from the Russian government, or any affiliated organization, to create or participate in ANY secret projects, including one for anti-DDoS protection. In the mid-to-late 2000s, Kaspersky Lab was already working to put together an anti-DDoS offering as well as asking customers, prospects and channel partners about this type of solution, and the Russian anti-cybercrime unit told the company that they considered DDoS attacks an emerging and serious threat. Since there was a strong market need, Kaspersky Lab invested in the R&D required to finish fully developing the solution, which is what Eugene Kaspersky indicated in the internal communications referenced by the publication. To clarify, the FSB is not currently, and never was, a Kaspersky Lab DDoS Protection client. Also, while developing the anti-DDoS product, Eugene Kaspersky made it clear in his internal communications that he did not want any possible leaks, as attackers could learn how to bypass the technology measures if public, and he didn’t want competitors to copy it before it could be launched.

4.    “The software also regularly communicates with the maker to receive updates, which security experts say could theoretically provide access to sensitive users such as government agencies, banks, and internet companies.”

Kaspersky Lab was one of the first companies in the industry to introduce hourly updates to provide the most recent detection for threats against our users. The product updates are thoroughly verified and designed exclusively to improve the detection of malware, and all the updates are encrypted and digitally signed, making them very hard to forge and almost impossible to alter by any third party. Kaspersky Lab does not provide access to these updates to any third party outside of the company, and Kaspersky Lab would never assist any entity in its efforts to spy on users. With a 20-year history in the IT security business as one of the most trusted security providers, the company’s reputation speaks for itself.

5.    “Kaspersky Lab confirmed the emails are authentic.”

Kaspersky Lab never confirmed the emails the media outlet claims to have are authentic, as the media outlet refused to share them with the company for validation to protect an anonymous source; however, the archives were thoroughly searched for any document they might be referring to, and an internal email that contains routine business chatter regarding product development may be the document the publication is referencing.

6.    “Kaspersky Lab would also cooperate with internet hosting companies to locate bad actors and block their attacks.”

Kaspersky Lab does not cooperate with hosting companies to locate bad actors, and cooperation with hosting providers in an anti-DDoS context means working with a hosting provider to block an attack on their level, before malicious traffic reaches the attacked web resource. This happens when the company experts understand that potential sources of the attack are located in particular data centers.

7.    “Active countermeasures” is a term of art among security professionals, often referring to hacking the hackers, or shutting down their computers with malware or other tricks.”

The article inaccurately attributes the countermeasures referenced to be for the government, when the information being discussed was actually referencing the types of active measures needed for strong DDoS-protection for customers, such as the DDoS intelligence system, which alerts that there is an emerging DDoS-attack against a customer through monitoring the activity of DDoS botnets.
Hacking back is illegal, and Kaspersky Lab has never been involved in such activities; and instead we are actively participating in joint shut-down of botnets led by law enforcements of several countries where the company provides technical knowledge (for example: https://www.interpol.int/News-and-media/News/2015/N2015-038).

8.    “The second part is more unusual: Kaspersky provides the FSB with real-time intelligence on the hackers’ location and sends experts to accompany the FSB and Russian police when they conduct raids.”

Kaspersky Lab assists law enforcement agencies around the world with fighting cyberthreats, including those in Russia, by providing cybersecurity expertise on malware and cyberattacks. When assisting in official Russian cybercrime investigations, in accordance with Russian law, we only provide technical expertise throughout the investigation to help them catch cybercriminals. Concerning raids and physically catching cybercriminals, Kaspersky Lab might ride along to examine any digital evidence found, but that is the extent of our participation, as we do not track hackers’ locations. Kaspersky Lab doesn’t provide any government agencies, nor other parties, with information on location of people and doesn’t gather “identifying data from customers’ computers” because it is technically impossible.

9.    The project lead was Kaspersky Lab’s chief legal officer, Igor Chekunov, a former policeman and KGB officer.

Reporting it this way is misleading, as Mr. Chekunov worked for the Border Service in the Soviet Union – serving obligatory military service for two years. At that time, the Border Service was a part of KGB structure. For example, in the U.S., this would be the same as working for customs and border protection (CBP), which is under the Department of Homeland Security (DHS). In addition, Mr. Chekunov did not lead the product development for the company’s anti-DDoS solution. 

 

Send tips and news to [email protected].

Tags: Agents Cloud Service Providers MSPs VARs/SIs Security

Most Recent


  • online survey
    Kaseya MSP Survey: Growing Importance of Automation, Cybersecurity Remains Top Challenge
    MSPs will need to be up to speed on their security offerings to meet SMB demand.
  • AI spells the end of end-user security
    AI Spells the End of End User Security
    We need to do a hard reset on our expectations for end user security.
  • Cloud Roundup
    Google Cloud Lashes Out at Microsoft, New Hurdle for Broadcom-VMware
    This cloud computing wrap-up showcases some big news and happenings at more under-the-radar cloud firms.
  • Joseph Chong Enterprise Connect
    ‘Collaborate Happy’: Zoom, Google Cloud, AWS Showcase New AI, Machine Learning Tools
    “Things that are not possible are possible,” said Google Cloud at Enterprise Connect.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • USB drive
    A Coup and a Theft: Why MSPs Can’t Let Clients Get Lax About USB Security
  • Ransomware skull and crossbones
    JBS Did What it 'Needed to Do' with $11 Million Ransom Payment
  • hybrid clouds
    Nutanix, HPE Team on Hybrid, Multicloud via GreenLake
  • lone Arctic wolf
    Arctic Wolf Enhances Partner Program with 2 New Tiers

Upcoming Events

View all

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Channel Partners Europe

June 13, 2023 - June 14, 2023

Channel Futures Leadership Summit

October 30, 2023 - November 2, 2023

Galleries

View all

Kaseya MSP Survey: Growing Importance of Automation, Cybersecurity Remains Top Challenge

March 30, 2023

Google Cloud Lashes Out at Microsoft, New Hurdle for Broadcom-VMware

March 30, 2023

National Women’s History Month: Channel Women on Getting Good Advice

March 30, 2023

Industry Perspectives

View all

AI Spells the End of End User Security

March 30, 2023

Why You Should Include Audiovisual Solutions in Your UC Services

March 28, 2023

Selling Your MSP: Strategic vs. Financial Buyers

March 22, 2023

Webinars

View all

Give Customers the Power: How MSPs Can Leverage Cloud Choice

April 4, 2023

DE&I Dialogue: How the Right DE&I Initiatives Can Propel Your Business

April 5, 2023

Meet the 2023 Channel Futures Channel Influencers

April 13, 2023

White Papers

View all

6 UCaaS Reseller Challenges and How Real World Businesses Solved Them

February 1, 2023

Frost Radar: North American UCaaS Market, 2022

February 1, 2023

The Complete Guide to White-Label UCaaS for Reseller Success

February 1, 2023

Channel Futures TV

View all

Kaseya, Post-Acquisition, Expanding ‘Well-Regarded’ Datto Partner Program

Aryaka ‘Driving Value to the Channel Community’ with Throttle

March 24, 2023

Coffee with Craig and James Episode 121: Hewlett Packard Enterprise

March 23, 2023

Real-Life M&A: Advice for a Successful Channel Deal

March 13, 2023

Twitter

ChannelFutures

.@KaseyaCorp #MSP survey shows growing significance of automation, #cybersecurity remains clients' top challenge.… twitter.com/i/web/status/1…

March 30, 2023
ChannelFutures

.@HP thanks partners, promises to reduce wait times and complexity across organization. #HPAmplify… twitter.com/i/web/status/1…

March 30, 2023
ChannelFutures

.@Kyndryl #layoffs impacting a percentage of workforce. dlvr.it/SllFbF https://t.co/Bo77KdJMpx

March 30, 2023
ChannelFutures

[email protected] makes #DE&I a priority year-round, not just for @womenshistmonth. “A constant cadence of activism… twitter.com/i/web/status/1…

March 30, 2023
ChannelFutures

📺 Tune into the latest CFTV episode, brought to you by @HitachiVantara, all about how you can identify your competi… twitter.com/i/web/status/1…

March 30, 2023
ChannelFutures

“Things that are not possible are possible,” said @Google's @behshad_behzadi at #EnterpriseConnect about generative… twitter.com/i/web/status/1…

March 30, 2023
ChannelFutures

📺 We asked 2023 #ChannelInfluencer @peter_kujawa from Service Leadership what his secret sauce is- his work philoso… twitter.com/i/web/status/1…

March 30, 2023
ChannelFutures

.@okta rolling out redesigned partner program. #cybersecurity dlvr.it/SlkYJl https://t.co/52Wx5prcNS

March 30, 2023

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X