The Trump administration moved on Tuesday to prevent government agencies from using products developed by Kaspersky Labs, an elite Russian cybersecurity firm, Politico reported.
The General Services Administration announced on Tuesday that it had removed Kaspersky from the list of approved vendors government agencies can use to obtain technology-related services.
"GSA’s priorities are to ensure the integrity and security of U.S. government systems and networks and evaluate products and services available on our contracts using supply chain risk management processes," a GSA spokesperson told Politico.
Kaspersky is currently under active FBI counterintelligence investigation, and the Senate Intelligence Committee is also probing the nature of its relationship to the Kremlin, and called it an "important national security issue."
After it emerged last month that the FBI was interviewing American employees who work for Kaspersky, a company spokesperson told Business Insider in a statement that the firm had not been "officially approached or notified by the bureau about an investigation," and denied having any ties to the Russian government.
"The company has a 20 year history in the IT security industry of always abiding by the highest ethical business practices, and Kaspersky Lab believes it is completely unacceptable that the company is being unjustly accused without any hard evidence to back up these false allegations," the statement said.
The White House, Department of Homeland Security, General Services Administration, and other agencies were engaged in an "interagency review" of Kaspersky’s possible risks for weeks before coming to a final decision, sources told ABC News.
Federal agencies will still be able to acquire Kaspersky’s services if they choose, but it would need to be done outside of GSA contracts, and the process can be complex, Politico reported.
Kaspersky’s products are widely used across the US, and officials worry that Russian state actors could exploit Kaspersky’s software and gain access to sensitive user data as well as critical infrastructure.
Russia has increasingly emerged as a central figure following a slew of high-profile cyberattacks over the past few years. In addition to interfering in the US election, Russia is also thought to be the culprit behind an elaborate effort to turn Ukraine into a cyber-weapon testing ground.
In 2015, a massive cyberattack leveled against the country’s power grid cut electricity to almost 250,000 Ukrainians. Cybersecurity experts linked the attack to IP addresses associated with Russia.
Since then, Wired magazine’s Andy Greenberg reported, Ukraine has seen a growing crisis in which an increasing number of corporations and government agencies have been hit by cyberattacks in a "rapid, remorseless succession."
Officials also believe Russia may have been behind last month’s "Petya" cyberattack that crippled countries and corporations across the globe.
And most recently, investigators have linked Russia to attacks on at least a dozen US nuclear facilities. The hacks, though confined to the enterprise side of the nuclear plants, raised red flags as they could be a preliminary step toward an attack against the US power grid, cybersecurity experts previously told Business Insider.
If that were the case, it would fit into a pattern adopted by Russia in the past, particularly as it relates to Ukraine.
Alex McGeorge, the head of threat intelligence at Immunity Inc., told Business Insider that instead of imposing economic sanctions in response to cyber threats, the US should retaliate by targeting key players in Russia’s cyber industry. The Trump administration’s move against Kaspersky may do just that.
"The intelligence community has come out and said there’s internal evidence saying Kaspersky is not playing fair and can’t really be trusted," McGeorge said. "It would send a good message and be a clear statement to Russia if the US government responded in kind and took aim exactly at the Russian cyber industry. That’s what a deterrent would look like."
from SAI http://read.bi/2t3PCyA