Consensus on infosec Twitter is that Kaspersky may not have colluded with RU gov; just maybe their product may be horrendously compromised.
-
Show this thread
-
Replying to @matthew_d_green
Or, something flagged Kaspersky's heuristics and something worth analyzing got forwarded on to their intel partner? We don't know.
3 replies 0 retweets 23 likes -
Replying to @hacks4pancakes
I’m not even sure what you describe is different from what the US is alleging.
1 reply 0 retweets 8 likes -
Replying to @matthew_d_green
In one narrative they were purposefully snooping for docs and in the other they were doing their expected job.
1 reply 4 retweets 37 likes -
Replying to @hacks4pancakes @matthew_d_green
I can't see an Israeli or US AV provider finding a piece of advanced Russian malware and not forwarding it to CTI partners.
5 replies 20 retweets 98 likes -
Replying to @hacks4pancakes @matthew_d_green
They absolutely would. However, I don't think anyone would call the Russians out of line for banning those providers on RU gov assets.
1 reply 0 retweets 5 likes -
Replying to @r0wdy_ @matthew_d_green
Sure, it's expected cyber threat intel operations that nation states should always account for.
1 reply 0 retweets 7 likes -
Replying to @hacks4pancakes @matthew_d_green
Yep. Seems to me data KSP gets ends up in RIS hands. May be their choice. May not. However, US response shouldn't need to make distinction
2 replies 0 retweets 8 likes
It'll be an interesting precedent when more non-RU AV products and similar get exploited a la CCleaner.
-
-
If I'm a commercial entity, I'm much more terrified of China compromising AV supply chain for IP theft.
0 replies 0 retweets 2 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.