Security

CSO

Kaspersky culls staff, closes doors in US amid Biden's ban

After all we've done for you, America, sniffs antivirus lab


Kaspersky has confirmed it will shutter its American operations and cut US-based jobs following President Biden's ban on the Russian business last month.

A spokesperson for the antivirus lab told The Register the closure will affect fewer than 50 stateside employees and layoffs will begin later this week.

"Starting from July 20 Kaspersky will gradually wind down its US operations and eliminate US-based positions," the rep told us. "The decision and process follows the final determination by the US Department of Commerce, prohibiting the sales and distribution of Kaspersky products in the US."

Commerce Secretary Gina Raimondo announced the ban in June, and at the time said Kaspersky would for national security reasons no longer be allowed to sell software in the US to new customers from July 20. Uncle Sam will also prohibit Kaspersky from distributing software updates and malware signatures to existing American customers after September 29, rendering its security software largely useless after that date.

"Russia has shown it has the capacity – and even more than that, the intent – to exploit Russian companies like Kaspersky to collect and weaponize the personal information of Americans," Raimondo said in June.

The next day, the US Treasury Department sanctioned a dozen C-suite and senior-level executives at the antivirus maker, but notably left CEO and co-founder Eugene Kaspersky off the list.

The Russian outfit, at the time, blamed the ban on "the present geopolitical climate and theoretical concerns," and argued it was not based on a legitimate evaluation of Kaspersky's services. America is heavily aiding Ukraine in fending off its Russian invaders, and the antivirus maker said it had been caught in the geopolitical cross-fire.

Kaspersky also denied it was a threat to US national security – Uncle Sam says the lab's products could be used by the Kremlin to backdoor American systems – and pledged to pursue legal action over the issue.

In a statement today, however, it sounds as though any plans to fight the ban in stateside courts fizzled out.

"The company has carefully examined and evaluated the impact of the US legal requirements and made this sad and difficult decision as business opportunities in the country are no longer viable," it said.

Kaspersky, the statement added, had been operating in the US for almost 20 years "contributing to the nation's strategic cybersecurity goals by safeguarding organizations and individuals in the country from ever-evolving cyberthreats."

It continued:

"Kaspersky's business remains resilient, and our key priority remains the same – to protect our customers in any country from cyberthreats. Being a global cybersecurity vendor, the company will continue investing in strategic markets and remain committed to serving its customers and partners and ensuring their protection." ®

Send us news
25 Comments

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

BlackBerry offloads Cylance's endpoint security products to Arctic Wolf

Fresh attempt to mix the perfect cocktail of IoT and Infosec

US reportedly mulls TP-Link router ban over national security risk

It could end up like Huawei -Trump's gonna get ya, get ya, get ya

Microsoft won't let customers opt out of passkey push

Enrollment invitations will continue until security improves

Australia moves to drop some cryptography by 2030 – before quantum carves it up

The likes of SHA-256, RSA, ECDSA and ECDH won't be welcome in just five years

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

Blocking Chinese spies from intercepting calls? There ought to be a law

Sen. Wyden blasts FCC's 'failure' amid Salt Typhoon hacks

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Boffins trick AI model into giving up its secrets

All it took to make an Google Edge TPU give up model hyperparameters was specific hardware, a novel attack technique … and several days

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting