Skip to main content

Kaspersky CEO hits back over malware claims

kaspersky ceo hits back over malware claims eugene
As we reported yesterday, well-known anti-virus outfit Kaspersky Labs has been accused of creating fake malware to confuse competing products. The claims were made anonymously by two ex-employees of the company and published by Reuters. Today, the CEO of Kaspersky Labs has refuted the accusations in a lengthy blog post.

The story is “complete nonsense, pure and simple” in the words of Eugene Kaspersky. “Disgruntled ex-employees often say nasty things about their former employers, but in this case, the lies are just ludicrous. Maybe these sources managed to impress the journalist, but in my view publishing such an ‘exclusive’ — WITHOUT A SHRED OF EVIDENCE — is not what I understand to be good journalism.”

Kaspersky admits the industry as a whole had a problem with “false positives” — legitimate software marked as malicious — during 2012 and 2013. He says these false positives seemed to be planted by an unknown party working to take down the major antivirus companies, and they certainly weren’t created by Kaspersky in an attempt to damage its rivals.

Of course, now it’s just one person’s word against another: Reuters hasn’t presented any evidence to back up its claims besides the information supplied by its anonymous sources, and Kaspersky hasn’t presented any evidence that proves his firm had nothing to do with it. This story could still have a long time to run and is unlikely to boost the public’s trust in the software security market as a whole.

“I really do hope that people will see through these anonymous, silly, and groundless accusations,” concludes Kaspersky in his defense. “What I can say for sure is that we’ll continue working very closely with the industry to make the digital world safer, and that our commitment and resolve to expose cyberthreats regardless of their source or origin won’t waiver.”

Editors' Recommendations

David Nield
Dave is a freelance journalist from Manchester in the north-west of England. He's been writing about technology since the…
Google security pro Tavis Ormandy calls Verizon’s anti-virus certification “meaningless”

Verizon-affiliated certificates for anti-virus are “meaningless," according to Google security expert Tavis Ormandy, who claims that the awards fail to recognize “low hanging fruit” flaws in AV products.

In a blog post last weekend, Ormandy criticized ICSA Labs, an independent division of Verizon, for rewarding Comodo’s anti-virus software its 2016 Excellence in Information Security Testing Award despite the fact that he had discovered vulnerabilities in the product.

Read more
Kaspersky finds 1,200 versions of ‘Steam stealer’ malware
The Steam logo in purple.

Over the past decade, Steam has become the go-to storefront for many PC gamers looking to expand their libraries. However, with its massive user base, the service has become a target for criminals — and new information from Kaspersky suggests that the tools these wrongdoers are using are becoming more sophisticated.

A new piece of malware, thought to originate in Russia, is being implemented to gain unlawful access to Steam accounts, according to a report from Hexus. Various different versions of this "Steam stealer" exploit are being shopped around the dark corners of the Internet, with prices apparently starting at around $30.

Read more
Unknown hacker infects malware with anti-virus program
dell secureworks prices hacker keyboard 2 970x0

How does that old expression go? If you can't beat them, join them? Although perhaps the best outcome is when you can beat them by joining them. That's what one unnamed white-hat hacker did in the case of the Dridex online banking Trojan virus. Unsuspecting victims of that nasty piece of malware have found themselves with a brand new anti-virus install instead of having their banking details stolen.

Dridex is a Trojan that's been commonplace in email inboxes for the past few years and is one of the top three pieces of phishing malware in terms of utilization. Authorities have been looking to shut it down for some time and in 2015 even managed to catch someone who may be responsible for it -- but the Trojan is still out there, causing damage.

Read more