News Stay informed about the latest enterprise technology news and product updates.

DHS banned Kaspersky software from all government systems

News roundup: DHS has banned Kaspersky software from use in government systems. Plus, the commonwealth of Virginia decided to do away with touchscreen voting machines, and more.

The U.S. Department of Homeland Security has directed that every government agency must remove any and all Kaspersky...

software from their systems within 90 days.

Elaine Duke, the acting secretary of homeland security, issued a Binding Operational Directive this week that calls on U.S. government agencies and departments to find any use of Kaspersky software on their systems within 30 days. Within 60 days, they must develop plans to remove that software. And within 90 days, they must execute those plans to remove Kaspersky software and discontinue its use in the future.

"The Department is concerned about the ties between certain Kaspersky officials and Russian intelligence and other government agencies, and requirements under Russian law that allow Russian intelligence agencies to request or compel assistance from Kaspersky and to intercept communications transiting Russian networks," DHS wrote in a statement. "The risk that the Russian government, whether acting on its own or in collaboration with Kaspersky, could capitalize on access provided by Kaspersky products to compromise federal information and information systems directly implicates U.S. national security."

This move by DHS is the latest in a series of actions taken by the U.S. government to vilify the Russia-based antivirus company and get its products away from government information systems. In July, the Trump administration removed Kaspersky Lab from the U.S. General Services Administration approved vendors list, rendering the company ineligible to get government contracts for products and services.

The software has also already been banned from the Department of Defense, and Sen. Jeanne Shaheen (D-N.H.) introduced an amendment to the National Defense Authorization Act this week that would ban Kaspersky software from any federal computer.

The intelligence community -- particularly the FBI -- has been investigating ties between Kaspersky Lab and the Russian government, but has yet to provide the public with any hard evidence of collusion or influence.

According to the statement from DHS on this latest move to remove and ban the software, this move is not reserved for the Russian company.

"Safeguarding federal government systems requires reducing potential vulnerabilities, protecting against cyber intrusions, and anticipating future threats," the statement from DHS read. "While this action involves products of a Russian-owned and operated company, the Department will take appropriate action related to the products of any company that present a security risk based on DHS's internal risk management and assessment process."

DHS also said it would be open to Kaspersky Lab submitting a written response addressing the concerns the U.S. government has raised. Kaspersky Lab co-founder and CEO Eugene Kaspersky has previously offered to let the U.S. government see the source code of his products on multiple occasions, and he accepted an offer to testify before the House of Representatives in defense of his company.

The concerns about Kaspersky software have not been limited to the government, as retail chain Best Buy announced it is pulling Kaspersky products from its shelves, as well.

In other news:

  • The commonwealth of Virginia's board of elections voted to replace any and all touchscreen voting machines before the upcoming November elections. The voting machines, known as direct recording electronic (DRE) machines, will no longer be used in Virginia's elections, and the commonwealth is determined to make the change before its gubernatorial election this year. This move comes shortly after a demonstration at the DefCon conference in July proved the extreme vulnerability of electronic voting systems. "This recommendation is being made for multiple reasons," the board of elections wrote in a memo, "including the current security environment surrounding election administration, recently released public reports with confidential information related to unauthorized access to DREs at DefCon's 'Voting Machine Hacking Village,' the fact that no DREs in use in Virginia have a voter-verifiable paper audit trail (VVPAT), and the initial security assessment review of various DRE equipment conducted by the Virginia Information Technology Agency (VITA)." Approximately 22 localities in the commonwealth still use DREs and will need to switch to new systems, though the specific voting machines that will replace them were not noted.
  • Exploit broker Zerodium has offered $1 million for zero-day exploits of the Tor Browser. Zerodium said it is gathering exploits on the Tor Browser to help the government. "While Tor network and Tor Browser are fantastic projects that allow legitimate users to improve their privacy and security on the internet, the Tor network and browser are, in many cases, used by ugly people to conduct activities such as drug trafficking or child abuse," the broker wrote in its announcement of the project. "We have launched this special bounty for Tor Browser zero-days to help our government customers fight crime and make the world a better and safer place for all." The program will run through the end of November, or it will end when the total payouts reach the $1 million limit. Specifically, Zerodium is looking for "a fully functional zero-day exploit for Tor Browser with JavaScript BLOCKED," or exploits for Tor Browser with JavaScript.
  • A WordPress plug-in was updated with malicious code, affecting around 200,000 sites. Wordfence, WordPress's plug-in security group, reported this week that the plug-in called Display Widgets was sold by its original author to a third-party in May 2017 for $15,000. The third-party purchaser then released an updated version of the plug-in a month later that showed malicious behavior. Since then, more updates of the plug-in have been released with more malicious behavior. According to Wordfence, the last three versions of Display Widgets have contained code that allows the plug-in owner to publish any content to the WordPress site, essentially creating a backdoor. "The authors of this plugin have been using the backdoor to publish spam content to sites running their plugin," Wordfence explained. "During the past three months the plugin has been removed and readmitted to the WordPress.org plugin repository a total of four times. The plugin is used by approximately 200,000 WordPress websites, according to WordPress repository." Wordfence suggested anyone with Display Widget installed should remove it immediately.

Next Steps

Learn more about the need for post-election audits in the U.S.

Discover how Kaspersky antimalware protection products work

Find out about the cybersecurity skills gap at DHS

Dig Deeper on Government information security management

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What do you think about the U.S. banning the use of Kaspersky products?
Cancel
Ridiculous. The US ought to wake up that friendship with Russia would be their greatest asset.

they just ought to wake up to friendship. 

instead of seeing the whole world and every problem through a gunsight.

it's ludicrous. wild west cowboy super hero mentality and all in the service of coldly calculating suave inner city globalist bankers etc..

wake up...

i now watch kids television for the artistry demonstrated and humanity represented, the real talents displayed and when I want something childish I turn to the news....
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close