Kaspersky Lab#Malware discovery

{{Outdated as of}}

{{short description|Russian multinational cybersecurity and anti-virus provider}}

{{pp|small=yes}}

{{Use American English|date=March 2023}}

{{Use mdy dates|date=March 2023}}

{{Infobox company

| name = Kaspersky Lab

| logo = kaspersky logo.svg

| image = Kaspersky virlab.JPG

| image_caption = Kaspersky Virus Lab (September 18, 2014)

| native_name = Лаборатория Касперского

| native_name_lang = ru

| romanized_name = Laboratoriya Kasperskogo

| type = Private

| industry = Computer software{{cite web|url=http://www.hoovers.com/company-information/cs/company-profile.laboratoriya_kasperskogo_ao.9ef9b249250ca034.html|title=Laboratoriya Kasperskogo, AO – Company Overview|publisher=D&B Hoovers}}

| foundation = Moscow, Russia
({{start date and age|1997}})

| founders = {{ubl|Eugene Kaspersky| Natalya Kaspersky|Alexey De-Monderik|Vadim Bogdanov}}

| location = Moscow, Russia

Regional units: Dubai, UAE; Istanbul, Turkey; London, United Kingdom; Mexico City, Mexico; Midrand, South Africa; São Paulo, Brazil; Singapore; Woburn, Massachusetts, USA

| area_served = Worldwide

| key_people = Eugene Kaspersky (CEO)

| products = Cybersecurity software

| services = Computer security

| revenue = {{increase}}US$822 million (2024){{cite web|url=https://ciso.economictimes.indiatimes.com/news/corporate/kaspersky-reports-2024-financial-results-with-record-revenue/120203701|title=Kaspersky reports 2024 financial results with record revenue|work=ET CISO |publisher=indiatimes.com|access-date=2025-04-22|lang=en|archive-date=2025-04-22|archive-url=https://web.archive.org/web/20250422163957/https://ciso.economictimes.indiatimes.com/news/corporate/kaspersky-reports-2024-financial-results-with-record-revenue/120203701|url-status=live}}

| operating_income =

| num_employees = 4,000+ (2020){{cite web|url=https://www.kaspersky.com/about/company|title=About Us|publisher=Kaspersky Lab|access-date=August 26, 2020}}

| homepage = {{URL|https://www.kaspersky.com}}

| footnotes =

}}

Kaspersky Lab ({{IPAc-en|k|æ|ˈ|s|p|ɜːr|s|k|i}}; {{langx|ru|Лаборатория Касперского|translit=Laboratoriya Kasperskogo}}) is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky and Alexey De-Monderik. Kaspersky Lab develops and sells antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.

Kaspersky expanded abroad from 2005 to 2010 and grew to $704 million in annual revenues by 2020,{{Cite web|date=April 19, 2021|title=Kaspersky reports financial results with stable business growth in 2020|url=https://www.kaspersky.co.in/about/press-releases/2021_kaspersky-reports-financial-results-with-stable-business-growth-in-2020|access-date=April 25, 2021|publisher=Kaspersky Lab|language=en}} up 8% from 2016, though annual revenues were down 8% in North America due to US government security concerns.{{cite news |last1=Stubbs |first1=Jack |title=Kaspersky Lab 2017 revenue up 8 percent, North America sales fall |url=https://www.reuters.com/article/us-russia-kaspersky-lab-results/kaspersky-lab-2017-revenue-up-8-percent-north-america-sales-fall-idUSKBN1F818F |access-date=September 5, 2018 |publisher=Reuters |date=January 19, 2018}} {{As of|2016|post=,}} the software has about 400 million users and has the largest market-share of cybersecurity software vendors in Europe. Kaspersky Lab ranks fourth in the global ranking of antivirus vendors by revenue.The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2010. The rating was published in the IDC report Worldwide IT Security Products 2011–2015 Forecast and 2010 Vendor Shares – December 2011. The report ranked software vendors according to earnings from sales of endpoint security solutions in 2010. It was the first Russian company to be included into the rating of the world's leading software companies, called the Software Top 100 (79th on the list, as of June 29, 2012). Kaspersky Lab is ranked 4th in Endpoint Security segment according to IDC data for 2010.Worldwide Endpoint Security Revenue by Vendor, 2010

The Kaspersky Global Research and Analysis Team (GReAT) has led the discovery of sophisticated espionage platforms conducted by nations, such as Equation Group and the Stuxnet worm.{{Cite web|title=About Management Team |publisher=Kaspersky Lab|url=https://www.kaspersky.com/about/team|access-date=November 13, 2021}} {{Clarify|text=Various covert government-sponsored|reason=by which government?|date=December 2024}} cyber-espionage efforts were uncovered through their research.{{Cite web |last=Shoorbajee |first=Zaid |date=2018-03-12 |title=Kaspersky uncovers sophisticated cyber-espionage operation across Africa and Middle East |url=https://cyberscoop.com/kaspersky-slingshot-malware-apt/ |access-date=2025-04-27 |website=CyberScoop |language=en-US}} Kaspersky also publishes the annual Global IT Security Risks Survey.{{cite web |title= 10 Stupid Moves That Threaten Your Company's Security |website= InformationWeek |date= April 6, 2016 |url= http://www.informationweek.com/strategic-cio/10-stupid-moves-that-threaten-your-companys-security/d/d-id/1324035 |access-date= April 6, 2016 }} {{As of|2014|post=,}} Kaspersky's research hubs analyze more than 350,000 malware samples per day.{{cite web |title= Kaspersky Lab advances expansion plans with London research centre |website= Computer Weekly |date= April 24, 2016 |url= http://www.computerweekly.com/news/4500246191/Kaspersky-Lab-advances-expansion-plans-with-London-research-centre |access-date= April 24, 2016 |first= Warwick |last=Ashford}}

The US government has alleged that Kaspersky has engaged with the Russian Federal Security Service (FSB)—ties which the company has actively denied.{{Cite news |last=Shaheen |first=Jeanne |date=2017-09-04 |title=The Russian Company That Is a Danger to Our Security |url=https://www.nytimes.com/2017/09/04/opinion/kapersky-russia-cybersecurity.html |url-status=live |archive-url=https://web.archive.org/web/20170908095741/https://www.nytimes.com/2017/09/04/opinion/kapersky-russia-cybersecurity.html |archive-date=2017-09-08 |accessdate=2017-09-09 |work=The New York Times |issn=0362-4331}}{{cite news |title=Kaspersky under scrutiny after Bloomberg story claims close links to FSB |url=https://arstechnica.com/information-technology/2017/07/kaspersky-denies-inappropriate-ties-with-russian-govt-after-bloomberg-story/ |url-status=live |archive-url=https://web.archive.org/web/20170909052550/https://arstechnica.com/information-technology/2017/07/kaspersky-denies-inappropriate-ties-with-russian-govt-after-bloomberg-story/ |archive-date=2017-09-09 |accessdate=2017-09-09 |work=Ars Technica}}{{Cite news |last=Solon |first=Olivia |date=2017-09-13 |title=US government bans agencies from using Kaspersky software over spying fears |url=https://www.theguardian.com/technology/2017/sep/13/us-government-bans-kaspersky-lab-russian-spying |url-status=live |archive-url=https://web.archive.org/web/20180115151529/https://www.theguardian.com/technology/2017/sep/13/us-government-bans-kaspersky-lab-russian-spying |archive-date=2018-01-15 |accessdate=2017-12-18 |work=The Guardian |issn=0261-3077}} In 2017 The Trump administration issued a ban of Kaspersky software on federal civilian and military computers. In response to these and other allegations, Kaspersky began to solicit independent reviews and verification of its source code, and relocated core infrastructure and customer data from Russia to Switzerland. Multiple countries have banned or restricted their government agencies from using Kaspersky products, including Lithuania,{{Cite news |date=21 December 2017 |title=Lithuania bans Kaspersky Lab software on sensitive computers |url=https://www.reuters.com/article/us-lithuania-russia-idUSKBN1EF23M |url-status=live |archive-url=https://web.archive.org/web/20220320003017/https://www.reuters.com/article/us-lithuania-russia-idUSKBN1EF23M |archive-date=2022-03-20 |access-date=2022-03-20 |newspaper=Reuters |via=www.reuters.com}} the Netherlands,{{Cite news |date=14 May 2018 |title=Dutch government to phase out use of Kaspersky anti-virus software |url=https://www.reuters.com/article/us-cyber-netherlands-kaspersky-idUSKCN1IF2NV |url-status=live |archive-url=https://web.archive.org/web/20220320003011/https://www.reuters.com/article/us-cyber-netherlands-kaspersky-idUSKCN1IF2NV |archive-date=2022-03-20 |access-date=2022-03-20 |newspaper=Reuters |via=www.reuters.com}} and the United States.{{Cite news |last1=Nakashima |first1=Ellen |last2=Gillum |first2=Jack |date=2017-09-13 |title=U.S. bans use of Kaspersky software in federal agencies amid concerns of Russian espionage |url=https://www.washingtonpost.com/world/national-security/us-to-ban-use-of-kaspersky-software-in-federal-agencies-amid-concerns-of-russian-espionage/2017/09/13/36b717d0-989e-11e7-82e4-f1076f6d6152_story.html |url-status=live |archive-url=https://web.archive.org/web/20170913173741/https://www.washingtonpost.com/world/national-security/us-to-ban-use-of-kaspersky-software-in-federal-agencies-amid-concerns-of-russian-espionage/2017/09/13/36b717d0-989e-11e7-82e4-f1076f6d6152_story.html |archive-date=2017-09-13 |accessdate=2017-09-13 |newspaper=Washington Post |issn=0190-8286}} On 20 June 2024, the US announced that it would prohibit Kaspersky from selling or distributing updates to its software to US customers which caused the cybersecurity company to leave the US market the following month.{{cite web|url=https://www.bbc.com/news/articles/cyr7ex16p32o|title=Kaspersky Labs: Russian antivirus firm leaving the US after ban|website=BBC|date=16 July 2024}}{{cite web|url=https://www.pcgamer.com/gaming-industry/russian-antivirus-giant-kaspersky-leaves-the-us-after-two-decades-slams-the-theoretical-concerns-that-led-to-it-being-banned/|title=Russian antivirus giant Kaspersky leaves the US after two decades, slams the 'theoretical concerns' that led to it being banned|website=PCGamer|date=16 July 2024}}

History

The first version of Kaspersky Lab's antivirus software was developed by Eugene Kaspersky in 1989 in response to the Cascade Virus.{{cite news|title=#1741 Eugene Kaspersky|newspaper=Forbes|url=https://www.forbes.com/profile/eugene-kaspersky/|access-date=November 11, 2015}}{{cite news|url=https://www.nytimes.com/2012/06/04/technology/cyberweapon-warning-from-kaspersky-a-computer-security-expert.html?pagewanted=all|title=Expert Issues a Cyberwar Warning|work=The New York Times|date=June 3, 2012|first1=Andrew E.|last1=Kramer|first2=Nicole|last2=Perlroth}} Early versions had just 40 virus definitions and were mostly distributed to friends and family members.{{citation|url=http://salempress.com/initstore/pdfs/bios_com_pgs.pdf|title=Salem Press Bios|publisher=Salem Press|access-date=November 13, 2015}}{{Dead link|date=August 2023 |bot=InternetArchiveBot |fix-attempted=yes }} Kaspersky continued developing the software at KAMI, resulting in the AntiViral Toolkit Pro (AVP) product released in 1992.{{cite book|last=Graham|first=L.|title=Lonely Ideas: Can Russia Compete?|publisher=MIT Press|year=2013|isbn=978-0-262-31739-9|url=https://books.google.com/books?id=tciqAAAAQBAJ&pg=PA93|access-date=November 11, 2015|pages=93–94}} It was popularized in 1994 after a competitive analysis by Hamburg University gave his software first place.{{cite book|last=Kshetri|first=N.|title=Global Entrepreneurship: Environment and Strategy|publisher=Taylor & Francis|year=2014|isbn=978-1-317-74803-8|url=https://books.google.com/books?id=swxgAwAAQBAJ&pg=PT110|access-date=November 11, 2015|page=110}}{{cite book|last=Springer|first=P.J.|title=Cyber Warfare: A Reference Handbook|publisher=ABC-CLIO|series=Contemporary World Issues|year=2015|isbn=978-1-61069-444-5|url=https://books.google.com/books?id=S6egBgAAQBAJ&pg=PA163|access-date=November 11, 2015|page=163}}{{cite web|website=Russia Beyond The Headlines|date=April 29, 2010|url=http://rbth.com/articles/2010/04/29/the_virus_warrior_a_start_up_tale.html|access-date=October 23, 2016|title=The virus warrior: a start-up tale}}

In 1997, Eugene Kaspersky, his wife Natalya Kaspersky, and Alexey De-Monderik left KAMI to form Kaspersky Lab,{{cite magazine|last=Shachtman|first=Noah|title=Russia's Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals|magazine=WIRED|date=April 19, 2011|url=https://www.wired.com/2012/07/ff_kaspersky/|access-date=April 24, 2016}}{{efn|Sources conflict and/or are ambiguous as to the exact number of engineers besides Kaspersky and his wife that cofounded the company.{{cite news|last=Sambandaraksa|first=Don|agency=Post Publishing|title=Kaspersky wants digital passports|website=Bangkok Post|date=September 3, 2015|url=http://www.bangkokpost.com/tech/world-updates/198706/kaspersky-wants-digital-passports|access-date=November 13, 2015}}{{cite web|last=Swartz|first=Jon|title=Russian Kaspersky Lab offers antivirus protection in U.S.|website=ABC News|date=November 25, 2008|url=https://abcnews.go.com/Business/story?id=6329227&page=1|access-date=November 13, 2015}}}} and to continue developing the antivirus product, then called AVP.{{cite web|title=Contemporary Biographies in Communications & Media|url=http://www.salempress.com/store/pdfs/bios_com_pgs.pdf|publisher=Salem Press|access-date=April 24, 2016|archive-date=March 29, 2017|archive-url=https://web.archive.org/web/20170329213243/http://www.salempress.com/store/pdfs/bios_com_pgs.pdf|url-status=dead}}{{cite web|title=Interview: Eugene Kaspersky|website=Infosecurity Magazine|date=March 17, 2010|url=https://www.infosecurity-magazine.com/interviews/interview-eugene-kaspersky/|access-date=April 24, 2016}} The product was renamed Kaspersky Anti-Virus after an American company registered the AVP trademark in the US.

In 1998, a Taiwanese student released a virus called CIH. During the first three weeks of the outbreak, Kaspersky Lab's AVP was the only software at the time able to remove it. This increased demand and led to deals with antivirus companies in Japan, Finland and Germany to integrate AVP into their software.{{cite book|last1=Meyer|first1=K.|last2=Peng|first2=M.|title=International Business|publisher=Cengage Learning|year=2016|isbn=978-1-4737-2264-4|url=https://books.google.com/books?id=OWeoCwAAQBAJ&pg=PA310|access-date=April 24, 2016|page=310}}

According to WIRED, Kaspersky's software was "advanced for the time". For example, it was the first software to monitor viruses in an isolated quarantine.{{cite magazine|last=Shachtman|first=Noah|title=Russia's Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals|magazine=WIRED|date=April 19, 2011|url=https://www.wired.com/2012/07/ff_kaspersky/all/|access-date=November 12, 2015}} The company's revenue grew 280 percent from 1998 to 2000, with about 60 percent of its revenue coming from foreign sales. Natalya worked to broker deals abroad and localize the software. It opened offices in the UK, Poland, Holland and China. It later expanded to Germany, France, the US and Japan. By 2000, the company had 65 employees and sales in more than 40 countries. Kaspersky opened new offices in South East Asia and the Middle East in 2008 and in South Africa in 2009.{{cite web|title=IT firm Kaspersky sees African opportunity|website=Business Day Live|date=November 23, 2009|url=http://www.bdlive.co.za/articles/2009/11/23/it-firm-kaspersky-sees-african-opportunity|access-date=April 24, 2016}} It also expanded in India, the Middle East and Africa in 2010.{{cite web|title=STC, Russia's Kaspersky Lab in smartphone security deal|website=Arab News|date=April 28, 2010|url=http://www.arabnews.com/node/343616|access-date=April 24, 2016}} In 2009, retail sales of Kaspersky Lab's antivirus products reached almost 4.5 million copies per year.

In 2011, General Atlantic bought a 20 percent share of Kaspersky Lab for $200 million, with the expectation of helping the company go public. A few months later, the decision was made to keep the firm private and Kaspersky re-purchased the shares from General Atlantic.{{cite web|title=UPDATE 2-Kaspersky to buy out U.S. investors, rules out IPO|website=Reuters|date=February 3, 2012|url=https://www.reuters.com/article/kaspersky-idUSL2E8D3ETO20120203|access-date=April 24, 2016}}{{cite news|last=Dunn|first=John E|title=Kaspersky Lab CEO cancels IPO plans, wants to buy back 20% stake|newspaper=Computerworld UK|date=February 8, 2012|url=http://www.computerworlduk.com/news/it-vendors/kaspersky-lab-ceo-cancels-ipo-plans-wants-buy-back-20-stake-3335881/|access-date=April 25, 2016}}{{cite news|last=Arnold|first=Martin|title=General Atlantic buys 20% Kaspersky stake|newspaper=Financial Times|date=January 20, 2011|url=http://www.ft.com/cms/s/2/b7cc912a-24d7-11e0-a919-00144feab49a.html|access-date=April 25, 2016}} This was followed by numerous executive departures in 2011 and 2014 regarding disputes over going public and over Eugene Kaspersky's management style.

On January 1, 2012, Kaspersky Lab officially left the Business Software Alliance (BSA) over SOPA. The BSA had supported the controversial anti-piracy bill, but Kaspersky Lab did not support it stating, "we believe that such measures will be used contrary to the modern advances in technology and the needs of consumers," and to show their disapproval, announced their intent to leave on December 5, 2011.{{Cite news|url=https://www.zdnet.com/article/kaspersky-leaves-bsa-over-us-piracy-bill/|title=Kaspersky leaves BSA over US piracy bill|last=Espiner|first=Tom|work=ZDNet|access-date=May 18, 2017|language=en}}{{cite news|url=http://www.techspot.com/news/46532-kaspersky-leaves-business-software-alliance-over-sopa.html|title=Kaspersky leaves Business Software Alliance over SOPA|work=TechSpot|access-date=May 18, 2017|language=en-us}}

By 2013, the company had an unaudited $667 million in annual revenues.{{cite web|last=Finkle|first=Jim|title=Kaspersky Lab executives depart amid business strategy dispute|website=Reuters|date=May 2, 2014|url=https://www.reuters.com/article/us-kaspersky-management-idUSBREA410RS20140502|access-date=April 24, 2016}} In 2014, Kaspersky Lab signed a distribution deal with Ingram Micro, which significantly expanded its reseller program.{{cite web|last=Hoffman|first=Stefanie|title=Kaspersky Lab Expands Reach With Ingram Micro Partnership|website=CRN|date=June 21, 2011 |url=http://www.crn.com/news/security/231000139/kaspersky-lab-expands-reach-with-ingram-micro-partnership.htm|access-date=April 24, 2016}}

In August 2015, two former Kaspersky employees alleged that the company introduced modified files into the VirusTotal antivirus database to trick software from Kaspersky competitors into triggering false positives in virus and malware scans. A possible motive is that Eugene Kaspersky allegedly was furious at competitors perceived to be "unfairly" free-riding on Kaspersky's malware discoveries via the open-source VirusTotal database. The company denied the allegations.{{cite web|url=https://www.reuters.com/article/us-kaspersky-rivals-idUSKCN0QJ1CR20150814|title=Exclusive: Russian antivirus firm faked malware to harm rivals - Ex-employees|publisher=Reuters|date=August 14, 2015|access-date=March 31, 2016}}{{cite web|title=Russian antivirus firm Kaspersky faked malware to harm rivals, according to former employees|website=Business Insider|date=August 14, 2015|url=http://www.businessinsider.com/russian-antivirus-firm-kaspersky-faked-malware-to-harm-rivals-according-to-former-employees-2015-8|access-date=April 26, 2016}}{{cite web|last=Menn|first=Joseph|title=Exclusive: Russia's Kaspersky threatened to 'rub out' rival, email shows|website=Reuters|date=August 28, 2015|url=https://www.reuters.com/article/us-kaspersky-rivals-idUSKCN0QX2GO20150828|access-date=November 11, 2015}} On his personal blog, Eugene Kaspersky compared the accusations to unsubstantiated conspiracy theories.{{cite web|last1=Sharwood|first1=Simon|title=Kaspersky: Freemasons coded fake malware in the Bermuda Triangle|url=https://www.theregister.co.uk/2015/08/17/kaspersky_freemasons_coded_fake_malware_in_the_bermuda_triangle/|website=The Register|access-date=August 18, 2015}} Reuters followed up by publishing leaked emails allegedly from Kaspersky alluding to "falsies" and "rubbing out" foreign competitors; Kaspersky Lab stated the emails "may not be legitimate and were obtained from anonymous sources that have a hidden agenda".{{cite news|last1=Menn|first1=Joseph|title=Exclusive: Russia's Kaspersky threatened to 'rub out' rival, email shows|url=https://www.reuters.com/article/us-kaspersky-rivals-idUSKCN0QX2GO20150828|access-date=August 29, 2015|publisher=Reuters|date=August 28, 2015}}

In 2016, Kaspersky executive Ruslan Stoyanov was arrested by Russian authorities on charges predating his work at Kaspersky.{{cite news |last1=Goodin |first1=Dan |title=Kaspersky Lab's top investigator reportedly arrested in treason probe |url=https://arstechnica.com/information-technology/2017/01/kaspersky-labs-top-investigator-reportedly-arrested-in-treason-probe/ |access-date=March 30, 2019 |work=Ars Technica |date=January 25, 2017 |language=en-us}} In 2019, he was convicted of treason.{{cite news |title=Russia's ex-cybersecurity chief gets 22 sentence in jail |url=https://abcnews.go.com/Technology/wireStory/russias-cyber-security-chief-22-year-sentence-61326988 |access-date=March 30, 2019 |work=ABC News |date=February 28, 2019 |language=en}}{{cite news |last1=Wolff |first1=Josephine |title=The U.S.-Russia Relationship on Cybercrime Is About to Get Even More Strained |url=https://slate.com/technology/2019/03/russia-treason-trial-sergei-mikhailov-ruslan-stoyanov-cybercrime.html |access-date=March 30, 2019 |work=Slate Magazine |date=March 11, 2019 |language=en}}

In June 2023, Kaspersky Lab said many of its senior staff and managers were hit by an ongoing attack that it first suspected in early 2023 and has compromised thousands of iPhones. The oldest traces of infection date back to 2019. The Russian Federal Security Service (FSB) separately accused the US National Security Agency and company Apple of being behind the attack and infiltrating the phones of diplomats from China, Israel, NATO members, and Syria. Kaspersky Lab said it does not believe itself to be the main target and that it had not shared its own findings about the attack with Russian authorities until the FSB announcement.{{Cite news |last=Faulconbridge |first=Guy |url=https://www.reuters.com/technology/russias-fsb-says-us-nsa-penetrated-thousands-apple-phones-spy-plot-2023-06-01/ |title=Russia says US hacked thousands of Apple phones in spy plot |date=2023-06-01 |publisher=Reuters}}

On 20 June 2024, after the US announced that it would prohibit Kaspersky from selling or distributing updates to its software to US customers, the company announced it would leave the US market. On September 25, the company abruptly replaced its software on US users' computers with UltraAV software developed by US cybersecurity firm Pango, angering some users.{{Cite web|url=https://www.pcmag.com/news/kaspersky-antivirus-abruptly-replaced-with-ultraav-in-the-us-angering-users|title=Kaspersky Antivirus Abruptly Replaced With UltraAV in the US, Angering Users|website=PCMAG}}{{Cite web|url=https://www.bleepingcomputer.com/news/security/kaspersky-deletes-itself-installs-ultraav-antivirus-without-warning/|title=Kaspersky deletes itself, installs UltraAV antivirus without warning|website=BleepingComputer}}

Products and services

{{See also|Kaspersky Anti-Virus|Kaspersky Internet Security}}

File:Kaspersky Internet Security.png

Kaspersky Lab develops and markets antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.{{cite web|last=Technologies | first=Kaspersky Lab| title=Kaspersky Personal & Family Security Software|website=Kaspersky Lab United States|url=http://usa.kaspersky.com/|access-date=April 24, 2016}} It is the fourth or fifth largest endpoint security vendor{{cite web|title=2016 Gartner Magic Quadrant for Endpoint Security|url=https://www.gartner.com/en/documents/3196523|work=Gartner}} and the third largest consumer IT security software company. It is the sixth largest overall IT security company.{{cite web|last=Matlack|first=Carol|title=The Company Securing Your Internet Has Close Ties to Russian Spies|website=Bloomberg.com|date=March 19, 2015|url=https://www.bloomberg.com/news/articles/2015-03-19/cybersecurity-kaspersky-has-close-ties-to-russian-spies|access-date=April 26, 2016}} Its revenues are about 15 percent from Russian companies domestically, one-third from European organizations and one-fourth from US organizations.{{cite news|last=Steiner|first=Eduard|title=Wie Russland jetzt die Weltmärkte erobern will|website=DIE WELT|date=July 5, 2016|url=https://www.welt.de/wirtschaft/article156816145/Wie-Russland-jetzt-die-Weltmaerkte-erobern-will.html|language=de|access-date=August 9, 2016}} The software has about 400 million users in all.

Kaspersky's consumer software include the Antivirus, Internet Security and Total Security products.{{cite web|date=November 16, 2015|title=Kaspersky Total Security review|url=https://www.expertreviews.co.uk/software/internet-security/1401992/kaspersky-internet-security-2015-review|access-date=April 26, 2016|website=Expert Reviews}} The Antivirus software includes malware protection, monitors the PC for suspicious program behavior, and warns users about potentially dangerous websites. The Internet Security software adds privacy features, parental controls, anti-phishing tools.{{cite web|last=Roy|first=Anirban|title=Kaspersky Launches Antivirus, Internet Security, Total Security- Multi Device: Price, Availability|website=International Business Times, India Edition|date=September 9, 2015|url=http://www.ibtimes.co.in/kaspersky-launches-antivirus-internet-security-total-security-multi-device-price-availability-646029|access-date=April 26, 2016}}{{cite news|last=Rubenking|first=Neil J.|title=Kaspersky Anti-Virus (2016)|website=PC Magazine|date=July 29, 2015|url=https://www.pcmag.com/article2/0,2817,2460689,00.asp|access-date=April 24, 2016}} Total Security adds parental controls, adult website filters, diagnostic tools, a Password Manager application, and other features.{{cite web|title=Antimalware protection products: Kaspersky Endpoint Security|website=SearchSecurity|date=May 9, 2016|url=http://searchsecurity.techtarget.com/feature/Antimalware-protection-products-Kaspersky-Endpoint-Security|access-date=May 9, 2016}} Kaspersky's software is available for Macs, PCs, Android, iOS, Windows Mobile, BlackBerry and Symbian.{{cite news|title=Kaspersky Lab Kaspersky Security 10 for Mobile|newspaper=SC Magazine|date=July 24, 2013}}{{cite web|title=Android Antivirus|website=Tom's Guide|date=February 4, 2015|url=http://www.tomsguide.com/us/kaspersky-mobile-security,review-2100.html|access-date=June 6, 2016}}

For businesses, the company has developed Kaspersky Industrial CyberSecurity for OT environments, and Kaspersky Hybrid Cloud Security for container infrastructures. Detection and response solutions include Kaspersky Next XDR Expert, Kaspersky Next EDR Optimum, and Kaspersky SIEM for centralized security monitoring. The company markets the Kaspersky Endpoint Security for Business suite. It includes a centralized user interface and management application called the Kaspersky Security Center. The cybersecurity software itself is called the Kaspersky Security Network. The Kaspersky Administration KitSecurity Center manages configuration, installation and remote use. The business suite also has quarantine, reporting, and other features.{{cite web|last=Forrest|first=Derek|title=Kaspersky Lab Announces New Protection For Mac Endpoint Users|website=Tom's IT Pro|date=August 27, 2015|url=http://www.tomsitpro.com/articles/kaspersky-endpoint-security-mac-os,1-2843.html|access-date=April 26, 2016|archive-date=April 12, 2016|archive-url=https://web.archive.org/web/20160412024010/http://www.tomsitpro.com/articles/kaspersky-endpoint-security-mac-os,1-2843.html|url-status=dead}} Its software product for businesses with 25 staff or less is called Kaspersky Small Office Security (KSOS).{{cite web|title=Kaspersky Lab Launches Small Office Security|website=eWeek.com|date=April 29, 2015|url=http://www.eweek.com/small-business/kaspersky-lab-launches-small-office-security.html|access-date=April 27, 2016}}{{Dead link|date=August 2023 |bot=InternetArchiveBot |fix-attempted=yes }} Within the suite are products specifically for virtualization security,{{cite web|last=Stephenson|first=Peter|title=Kaspersky Security for Virtualization product review|website=SC Magazine|date=July 1, 2015|url=http://www.scmagazine.com/kaspersky-security-for-virtualization/review/4401/|access-date=August 20, 2016}} mobile security,{{cite web|last=Stephenson|first=Peter|title=Kaspersky Lab Kaspersky Security 10 for Mobile v10 product review|website=SC Magazine|date=July 1, 2013|url=http://www.scmagazine.com/kaspersky-lab-kaspersky-security-10-for-mobile-v10/review/3931/|access-date=August 20, 2016}} and fraud protection{{cite web|title=Kaspersky Lab Adds Device-Reputation Fraud Prevention|website=Dark Reading|date=August 24, 2015|url=http://www.darkreading.com/vulnerabilities---threats/kaspersky-lab-adds-device-reputation-fraud-prevention/d/d-id/1321894|access-date=August 20, 2016}} among others. Kaspersky also develops a free tool that helps businesses gain access to Windows devices that are infected by ransomware.{{cite web|last=Palmer|first=Danny|title=Kaspersky Lab offers free anti-ransomware tool for Windows|website=ZDNet|date=August 9, 2016|url=https://www.zdnet.com/article/kaspersky-lab-offers-free-anti-ransomware-tool-for-windows/|access-date=August 20, 2016}} In 2017, KasperskyOS, a secure operating system, was released,{{Cite web |last=Wei |first=Wang |title=KasperskyOS — Secure Operating System released for IoT and Embedded Systems |url=https://thehackernews.com/2017/02/kasperskyos-operating-system.html |access-date=2025-04-27 |website=The Hacker News |language=en}} and in 2021, Kaspersky IoT Secure Gateway 100 for IoT was introduced based on it.{{Cite web |title=Kaspersky Presents its First Cyber Immune Solution at Hannover Messe |url=https://www.automation.com/en-us/products/april-2021/kaspersky-first-cyber-immune-solution-hannover |access-date=2025-04-27 |website=automation.com |language=en}} Among cloud solutions, Kaspersky Hybrid Cloud Security protects cloud infrastructures, and Kaspersky SD-WAN ensures secure corporate networks.

= Threatpost =

Threatpost is a discontinued{{Cite web |date=2022-09-28 |title=Kaspersky Looks to Have Shuttered the Threatpost, the Security News Outlet They Secretly Own |url=https://www.pluginvulnerabilities.com/2022/09/28/kaspersky-looks-to-have-shuttered-the-threatpost-the-security-news-outlet-they-secretly-own/ |access-date=2023-06-29 |website=Plugin Vulnerabilities}} computer security blog which was funded by Kaspersky Lab. According to Eugene Kaspersky, it was independent of Kaspersky.{{Cite web |title=Who's Afraid of Kaspersky? |url=https://www.vice.com/en/article/kaspersky-sas-conference-russia-spying/ |access-date=June 10, 2022 |website=Vice.com |date=May 22, 2018 |language=en}} It was launched in 2009.{{Cite web |title=Threatpost launches as best practice for enterprise IT and social media |url=https://www.zdnet.com/article/threatpost-launches-as-best-practice-for-enterprise-it-and-social-media/ |access-date=June 10, 2022 |website=ZDNet |language=en}}{{Cite web |title=One year later, Threatpost continues to succeed for Kaspersky |url=https://www.zdnet.com/article/one-year-later-threatpost-continues-to-succeed-for-kaspersky/ |access-date=June 10, 2022 |website=ZDNet |language=en}} After August 2022, no new articles have been published on the site.{{Cite web |title=Threatpost {{!}} The first stop for security news |url=https://threatpost.com/ |archive-url=https://web.archive.org/web/20230628214738/https://threatpost.com/ |archive-date=2023-06-28 |access-date=2023-06-29 |website=Threatpost}}

Partnerships

The Kaspersky Anti-Virus engine also powers products or solutions by other security vendors, such as Check Point, Bluecoat, Juniper Networks, Microsoft Forefront,{{cite web|title=About our Partner: Microsoft Forefront|publisher=Kaspersky Lab|url=http://www.kaspersky.com/partners/oem/partners/microsoft_forefront}} Netintelligence, Clearswift, FrontBridge, Netasq, Wedge Networks, and others. Altogether, more than 120 companies are licensing technology from Kaspersky Lab. Kaspersky Lab also has a number of partnerships with various technology companies.

The International Multilateral Partnership Against Cyber Threats in which Datuk Mohd Noor Amin acts as the chairman, announced the appointment of Harry Cheung – Managing Director of Kaspersky Lab, APAC – as the Goodwill Ambassador for Greater China.{{cite web|url=http://www.antivirus365.net/event/impact.php|title=Event - Kaspersky Official eStore Southeast Asia|website=Antivirus365.net|access-date=October 26, 2017|archive-date=March 5, 2016|archive-url=https://web.archive.org/web/20160305101124/http://antivirus365.net/event/impact.php|url-status=dead}}

Kaspersky Lab was a long-term partner of Scuderia Ferrari and in December 2021, announced a partnership extension with the Formula One team, and also became the team's esports partner.{{cite web|url=https://www.kaspersky.com/about/press-releases/2021_kaspersky-extends-partnership-with-scuderia-ferrari-and-becomes-brands-esports-team-partner|title=Kaspersky extends partnership with Scuderia Ferrari and becomes brand's Esports team partner – Kaspersky |website=Kaspersky|date=December 16, 2021 |access-date=December 16, 2021}} However, in March 2022 the deal was paused as a joint decision taken by the two companies due to the 2022 Russian invasion of Ukraine.{{cite web|url=https://www.channelnewsasia.com/sport/ferrari-pauses-f1-partnership-russian-based-software-maker-kaspersky-spokesman-2571921|title=Ferrari pauses F1 partnership with Russian-based software maker Kaspersky: Spokesman|date=March 18, 2022|publisher=CNA|access-date=March 17, 2022|archive-date=March 17, 2022|archive-url=https://web.archive.org/web/20220317184840/https://www.channelnewsasia.com/sport/ferrari-pauses-f1-partnership-russian-based-software-maker-kaspersky-spokesman-2571921|url-status=dead}}

Market assessments and reception

According to 2016 reviews in PC Magazine, Kaspersky AntiVirus and competitor Bitdefender were both consistently ranked at the top in independent competitive tests.{{cite news|last=Rubenking|first=Neil J.|title=The Best Antivirus Utilities for 2016|magazine=PC Magazine|date=March 29, 2016|url=https://www.pcmag.com/article2/0,2817,2372364,00.asp|access-date=April 26, 2016}} PC Magazine's own malware and phishing tests had similar results and praised the software's "bonus security tools". Under "Cons" the magazine said it took longer than expected to complete a scan. The same magazine said the Kaspersky Total Security product had an "impressive feature list" and praised the extra features in the Total Security product, like password management, encryption and parental controls. PC Magazine said the product had scored highly in lab tests for antivirus, antiphishing and other features. It had "so-so" scores in anti-malware tests and was not able to catch all spam.{{cite web|last=Rubenking|first=Neil J.|title=Kaspersky Total Security (2017)|website=PCMAG|date=August 12, 2016|url=https://www.pcmag.com/article2/0,2817,2476367,00.asp|access-date=September 1, 2016}}

Kaspersky's 2013 Endpoint Security for Windows product was the top-ranked enterprise antivirus software in a competitive test by Dennis Technology Labs, followed by Symantec Endpoint Protection.{{cite web|last=Mesmmer|first=Ellen|title=Enterprise antivirus software test puts Kaspersky software out front, Microsoft at bottom|website=Network World|date=July 12, 2013|url=https://www.networkworld.com/article/676536/compliance-enterprise-anti-virus-software-test-puts-kaspersky-software-out-front-microsoft-at-bott.html|access-date=April 27, 2016}} AV-Comparatives awarded Kaspersky "Product of the Year" for 2015, based on the number of high scores it received throughout the year on a wide range of tests.{{citation|title=Anti-Virus Comparative: Summary Report 2015|url=http://www.av-comparatives.org/wp-content/uploads/2016/01/avc_sum_201512_en.pdf|date=December 30, 2015|publisher=AV Comparatives|access-date=April 30, 2016}}{{cite news|last=Hachman|first=Mark|title=Kaspersky, six others top malware removal tests|newspaper=PCWorld|date=December 3, 2013|url=http://www.pcworld.com/article/2068485/kaspersky-six-others-top-malware-removal-tests.html|access-date=April 24, 2016}}{{cite news|last1=Rubenking|first1=Neil|title=Kaspersky Named Antivirus Tsar|url=http://securitywatch.pcmag.com/security-software/319752-kaspersky-named-antivirus-tsar|website=PC Magazine|access-date=August 18, 2015}}{{efn|Bitdefender received the same number of high scores; Kaspersky was chosen arbitrarily between the two as a matter of tie-breaking. The two companies both tend to tie for the top position in competitive tests.}} PC Magazine praised the software's features, but said it lacked policy management and deployment options.{{cite news|last=Sarrel|first=Matthew D.|title=Kaspersky Lab Small Office Security|newspaper=PC Magazine|date=January 15, 2016|url=https://www.pcmag.com/article2/0,2817,2495688,00.asp|access-date=May 9, 2016}} Kaspersky's parental controls software was reviewed by PC Magazine. The reviewer said it was "well-rounded, very affordable parental control and monitoring". It praised the software's content filtering, child profiles, social media monitoring and other features, but criticized that some features were only available on iOS or Android.

The anti-virus software testing group AV-Comparatives gave the Windows XP version of Kaspersky AV an "Advanced+" rating (its highest) in both its February 2008 on-demand detection test (with the fourth highest detection rate among 16 products tested).{{cite web|url=http://www.av-comparatives.org/comparativesreviews/detection-test/168-file-detection-test-february-2008|title=Anti-Virus comparative February 2008|website=Av-comparatives.org|access-date=March 5, 2013|url-status=dead|archive-url=https://web.archive.org/web/20121027114423/http://av-comparatives.org/comparativesreviews/detection-test/168-file-detection-test-february-2008|archive-date=October 27, 2012}} However, in the Retrospective/Proactive Test May 2008, Kaspersky received the "Standard" rating, detecting 21% of new malware with 1-month old signatures and receiving a substantial amount of false positives.{{cite web|url=http://www.av-comparatives.org/comparativesreviews/retrospective-test/92-heuristic-behaviour-test-may-2008a|title=Retrospective / ProActive - Test May 2008|website=Av-comparatives.org|access-date=March 5, 2013|url-status=dead|archive-url=https://web.archive.org/web/20130215073050/http://www.av-comparatives.org/comparativesreviews/retrospective-test/92-heuristic-behaviour-test-may-2008a|archive-date=February 15, 2013}}

The firewall included in Kaspersky Internet Security 7.0 got a "Very Good" rating in Matousec's Firewall challenge,{{cite web|url=http://www.matousec.com/projects/firewall-challenge/results.php|title=Results and comments|website=Matousec.com|access-date=March 8, 2012}} with a result of 85%. Kaspersky Anti-Virus 7.0 has achieved a 6.5 result out of 8 in the Anti Malware Labs rootkit detection test.{{cite web|url=http://www.anti-malware-test.com/?q=taxonomy%2Fterm%2F7|title=Anti-rootkit tests | Anti-Malware Test Lab|website=Anti-malware-test.com|access-date=March 8, 2012|archive-date=April 19, 2021|archive-url=https://web.archive.org/web/20210419022714/http://www.anti-malware-test.com/?q=taxonomy%2Fterm%2F7|url-status=dead}} It has also achieved a 31 out of 33 detection of polymorphic viruses{{cite web|url=http://www.anti-malware-test.com/?q=taxonomy/term/5 |title=Anti-Malware Solutions Test Results | Anti-Malware Test Lab|website=Anti-malware-test.com|access-date=March 8, 2012|url-status=dead|archive-url=https://web.archive.org/web/20120308064815/http://www.anti-malware-test.com/?q=taxonomy%2Fterm%2F5|archive-date=March 8, 2012}} and a 97% result in the self-protection test.{{cite web|url=http://www.anti-malware-test.com/?q=taxonomy%2Fterm%2F16|title=Self-protection test | Anti-Malware Test Lab|website=Anti-malware-test.com|access-date=March 8, 2012|archive-date=March 8, 2012|archive-url=https://web.archive.org/web/20120308064810/http://www.anti-malware-test.com/?q=taxonomy%2Fterm%2F16|url-status=dead}}

In 2007, Kaspersky Internet Security 7 received an award from the British magazine PC Pro and also won a place in its "A List".{{cite news|url=http://www.kaspersky.co.uk/news?id=207575604|title=Kaspersky Internet Security 7.0 receives two top awards in testing conducted by the British magazine PC Pro|publisher=Kaspersky Lab|date=April 5, 2007}}

Kaspersky has passed most of the Virus Bulletin comparative tests since August 2003.{{cite web|url=https://www.virusbulletin.com/testing/vendors/recent/vb100-antimalware/kaspersky/all|title=All VB100 test history for vendor Kaspersky Lab|website=virusbulletin.com|access-date=September 29, 2018}} In 2005, according to PC World magazine, Kaspersky anti-virus software provided the fastest updates for new virus and security threats in the industry.{{cite news|url=http://www.pcworld.com/article/id,124493-page,1/article.html|title=Anti-Virus Personal 5.0 (Full Product)|work=PC World Magazine|date=January 25, 2005|access-date=August 18, 2014|url-status=dead|archive-url=https://web.archive.org/web/20080317035638/http://www.pcworld.com/article/id%2C124493-page%2C1/article.html|archive-date=March 17, 2008}}

In PC World magazine's March 2010 comparison of consumer security suites, Kaspersky Internet Security 2010 scored 4.5/5 stars, and was rated second overall.[http://www.pcworld.com/reviews/product/413778/review/internet_security_2010.html Kaspersky Lab Internet Security 2010 Antivirus & Security Software Review] {{Webarchive|url=https://web.archive.org/web/20110103025731/http://www.pcworld.com/reviews/product/413778/review/internet_security_2010.html |date=January 3, 2011 }}. PCWorld (March 30, 2010). Retrieved on September 29, 2010. In the December 2011 version of AV-Comparatives' annual reports, Kaspersky Lab's software achieved the highest overall ranking and has earned the AV Comparatives' "Product of the Year" award.{{cite web|url=http://www.av-comparatives.org/comparativesreviews/summary-reports|title=AV-Comparatives - Independent Tests of Anti-Virus Software - Summary Reports|website=Av-comparatives.org|access-date=February 25, 2013|archive-date=February 27, 2013|archive-url=https://web.archive.org/web/20130227105920/http://www.av-comparatives.org/comparativesreviews/summary-reports|url-status=dead}}

On February 1, 2012, Kaspersky Internet Security earned "AV-TEST Award for Best Repair 2011" award in the field of home user products from AV-TEST Institute.{{cite web|title=AV-TEST Award 2011|url=http://www.av-test.org/en/test-procedures/award/2011/|publisher=AV-TEST|access-date=February 25, 2013|year=2012}} On January 28, 2013, Kaspersky Endpoint Security earned "AV-TEST Award for Best Protection 2012" and "AV-TEST Award for Best Repair 2012" awards in the field of corporate products from AV-TEST Institute.{{cite web|title=AV-TEST 2012 Awards|url=http://www.av-test.org/en/test-procedures/award/2012/|website=AV-TEST.org|access-date=February 25, 2013|year=2013}}

Later in 2013, Kaspersky earned the product of the year award from AV-Comparatives and the highest score among Enterprise solutions in a Dennis Technology Labs report.{{cite web|last1=Mesmmer|first1=Ellen|title=Enterprise anti-virus software test puts Kaspersky software out front, Microsoft at bottom|url=https://www.networkworld.com/article/676536/compliance-enterprise-anti-virus-software-test-puts-kaspersky-software-out-front-microsoft-at-bott.html|website=Network World|date=July 12, 2013|access-date=August 18, 2015}}

Kaspersky has also received certification of its products through the OESIS OK Certification Program, which verifies that the applications are interoperable with third-party technology solutions like NAC and SSL VPN products from Cisco Systems, Juniper Networks, F5 Networks, and others.[http://www.kaspersky.com/news?id=207575876 New versions of Kaspersky Lab's personal products]. Kaspersky.com (July 31, 2009). Retrieved on September 29, 2010.

Kaspersky products regularly participate in and achieve high results{{cite web|url=https://memeburn.com/gearburn/2024/03/kaspersky-makes-a-statement-with-94-lead-in-comparative-tests/ |title=Kaspersky makes a statement with 94% lead in comparative tests |publisher=Gearburn |access-date=2025-01-31}}{{cite web|url=https://securitybrief.com.au/story/kaspersky-held-leading-position-in-2021-top3-metric|title=Kaspersky held leading position in 2021 TOP3 metric |publisher=SecurityBrief |access-date=2025-01-31}} in independent tests by AV-Test,{{cite web|url=https://www.pcmag.com/news/kaspersky-lab-honored-with-av-test-2013-innovation-award|title=Kaspersky Lab Honored with AV-Test 2013 Innovation Award |publisher=PC Mag |access-date=2025-01-31}} AV-Comparatives,{{cite web|url=https://varonline.com/av-comparatives-confirms-100-anti-tampering-protection-of-kaspersky-endpoint-security-for-business/|title=AV-Comparatives confirms 100% anti-tampering protection of Kaspersky Endpoint Security for Business? |publisher=VAR Online |access-date=2025-01-31}} and SE Labs.{{cite web|url=https://securitybrief.com.au/story/kaspersky-products-ace-se-labs-testing-with-flawless-defence|title=Kaspersky products ace SE Labs testing with flawless defence |publisher=SecurityBrief |access-date=2025-01-31}} These organizations are members of the Anti-Malware Testing Standards Organization (AMTSO),{{cite web|url=https://www.amtso.org/members/|title=AMTSO Members |publisher=AMTSO |access-date=2025-01-31}} which Microsoft has adopted as an “industry standard organization” for independent certification purposes.{{cite web|url=https://learn.microsoft.com/en-us/defender-xdr/virus-initiative-criteria?view=o365-worldwide|title=Microsoft Virus Initiative |publisher=Microsoft |access-date=2025-01-31}}

Finances

class="wikitable" border="1" style="text-align:center"
Year

! Revenue in million US$

! Growth / Decrease

! Development rate

2012

| 628{{cite web|url=http://online.wsj.com/article/SB10001424127887324432404579053091175949708.html|title=Data-Security Expert Kaspersky: There Is No More Privacy|date=2013-09-03|author=Paul Sonne|work=The Wall Street Journal|publisher=wsj.com|access-date=2013-09-05|lang=en|archive-date=2013-09-04|archive-url=https://web.archive.org/web/20130904132156/http://online.wsj.com/article/SB10001424127887324432404579053091175949708.html|url-status=live}}

| {{Growth}}

| 3 %

2013

| 667

| {{Growth}}

| 6 %

2014

| 711{{cite web|title=PwC Global 100 Software Leaders|website=PwC|url=https://www.pwc.com/gx/en/technology/publications/global-software-100-leaders/assets/global-100-software-leaders-2016.pdf|access-date=February 27, 2025}}

| {{Growth}}

| 6,6 %

2015

| 619{{cite web|url=https://www.crn.com/news/security/300088591/kaspersky-removed-from-gsa-schedule-limiting-federal-sales-for-its-security-software|title=Kaspersky Removed From GSA Schedule|date=2017-07-12|author=Sarah Kuranda|work=The Channel Co|publisher=crn.com|access-date=2025-02-27|lang=en|archive-date=2024-12-03|archive-url=https://web.archive.org/web/20241203171308/https://www.crn.com/news/security/300088591/kaspersky-removed-from-gsa-schedule-limiting-federal-sales-for-its-security-software|url-status=live}}

| {{Decrease}}

| 13 %

2016

| 644{{cite web|url=https://www.rferl.org/a/kaspersky-reports-8-percent-revenue-growth-despite-us-government-ban-software-/28986290.html|title=Kaspersky Lab Reports|date=2018-01-20|work=Radio Free Europe/Radio Liberty |publisher=rferl.com|access-date=2025-02-27|lang=en|archive-date=2024-09-17|archive-url=https://web.archive.org/web/20240917180808/https://www.rferl.org/a/kaspersky-reports-8-percent-revenue-growth-despite-us-government-ban-software-/28986290.html|url-status=live}}

| {{Growth}}

| 4 %

2017

| 698

| {{Growth}}

| 8 %

2018

| 726{{cite web|url=https://www.techbarrista.com/kaspersky-revenue-2018-726m/|title=Kaspersky Labs Revenue Up 4% in 2018 to $726m|work=TechBarrista |publisher=techbarrista.com|access-date=2025-02-27|lang=en|archive-date=2021-04-20|archive-url=https://web.archive.org/web/20210420200641/https://www.techbarrista.com/kaspersky-revenue-2018-726m/|url-status=live}}

| {{Growth}}

| 4 %

2019

| 685{{cite web|url=https://cybernews.com/security/top-cybersecurity-companies/|title=Best cybersecurity companies to watch in 2021|work=Cybernews |publisher=cybernews.com|access-date=2025-02-27|lang=en|archive-date=2024-10-09|archive-url=https://web.archive.org/web/20241009074936/https://cybernews.com/security/top-cybersecurity-companies/|url-status=live}}

| {{Decrease}}

| 6 %

2020

| 703,9{{cite web|url=https://www.statista.com/statistics/1196100/kaspersky-lab-revenue-worldwide/|title=Revenue of Kaspersky Lab worldwide from 2016 to 2022|work=Statista |publisher=statista.com|access-date=2025-02-27|lang=en|archive-date=2024-12-26|archive-url=https://web.archive.org/web/20241226142552/https://www.statista.com/statistics/1196100/kaspersky-lab-revenue-worldwide/|url-status=live}}

| {{Growth}}

| 3 %

2021

| 752,3

| {{Growth}}

| 6,8 %

2022

| 752,5

| {{Growth}}

| 0,03 %

2023

| 721{{cite web|url=https://www.crn.com/news/security/2024/kaspersky-sad-to-exit-us-market-layoffs-ahead-at-antivirus-software-company|title=Kaspersky ‘Sad’ To Exit U.S. Market|work=The Channel Co |publisher=crn.com|access-date=2025-02-27|lang=en|archive-date=2024-07-22|archive-url=https://web.archive.org/web/20240722160129/https://www.crn.com/news/security/2024/kaspersky-sad-to-exit-us-market-layoffs-ahead-at-antivirus-software-company|url-status=live}}

| {{Decrease}}

| 4,1 %

2024

| 822

| {{Growth}}

| 14 %

Malware discovery

Kaspersky Lab's Global Research and Analysis Team (GReAT) was established in 2008.{{cite book|last=Graham|first=L.|title=Lonely Ideas: Can Russia Compete?|publisher=MIT Press|year=2013|isbn=978-0-262-31739-9|url=https://books.google.com/books?id=tciqAAAAQBAJ&pg=PA93|access-date=April 24, 2016|page=93}} It investigates cybersecurity threats and other work by malware operations.{{cite news|last=Kovar|first=Joseph F.|title=What Is Kaspersky's GReAT?|newspaper=CRN|date=March 13, 2015|url=http://www.crn.com/news/storage/300075826/what-is-kasperskys-great.htm|access-date=April 24, 2016}} IT security companies are often evaluated by their ability to uncover previously unknown viruses and vulnerabilities. Kaspersky's reputation for investigating cyber-security threats has been influential in gaining sales and prestige.{{cite news|title=The Kaspersky Equation; Cyber-Security|newspaper=The Economist|date=February 21, 2015|url=https://www.highbeam.com/doc/1G1-402233169.html|archive-url=https://web.archive.org/web/20171026110850/https://www.highbeam.com/doc/1G1-402233169.html|url-status=dead|archive-date=October 26, 2017|access-date=April 25, 2016}} Beginning around 2010, Kaspersky exposed a series of government-sponsored cyber-espionage and sabotage efforts. These include Stuxnet, Duqu, Flame, Gauss, Regin and the Equation Group. According to Wired, "many of them [were] seemingly launched by the US and its UK and Israeli allies. Kaspersky is especially well-known for its work uncovering Stuxnet, Careto,{{Cite web |url=http://www.kaspersky.com/about/news/virus/2014/Kaspersky-Lab-Uncovers-The-Mask-One-of-the-Most-Advanced-Global-Cyber-espionage-Operations-to-Date-Due-to-the-Complexity-of-the-Toolset-Used-by-the-Attackers |title=Kaspersky Lab Uncovers 'The Mask': One of the Most Advanced Global Cyber-espionage Operations to Date Due to the Complexity of the Toolset Used by the Attackers, 11 February 2014 |access-date=11 February 2014 |archive-url=https://web.archive.org/web/20140221140933/http://www.kaspersky.com/about/news/virus/2014/Kaspersky-Lab-Uncovers-The-Mask-One-of-the-Most-Advanced-Global-Cyber-espionage-Operations-to-Date-Due-to-the-Complexity-of-the-Toolset-Used-by-the-Attackers |archive-date=21 February 2014 |url-status=dead }} and Flame."{{cite web|last=MacFarquhar|first=Neil|title=A Russian Cybersleuth Battles the 'Dark Ages' of the Internet|website=The New York Times|date=June 10, 2016|url=https://www.nytimes.com/2016/06/11/world/europe/kaspersky-lab-russia-cybercrime-internet.html|access-date=July 13, 2016}}

=Stuxnet=

{{main|Stuxnet}}

In 2010, Kaspersky Lab worked with Microsoft to counteract the Stuxnet worm, which had infected 14 industrial locations in Iran using four zero-day vulnerabilities in Microsoft Windows. According to IEEE Spectrum, the circumstances "strongly suggest" the worm was developed by the United States and Israel to damage centrifuges in Iran's nuclear-enrichment program. It was the first discovery of a major government-sponsored cyber-attack.{{cite web|last=Kushner|first=David|title=The Real Story of Stuxnet|website=IEEE Spectrum|date=February 26, 2013|url=https://spectrum.ieee.org/the-real-story-of-stuxnet|access-date=April 25, 2016}}{{cite journal|last=Weinberger|first=Sharon|title=Computer security: Is this the start of cyberwarfare?|journal=Nature|volume=474|issue=7350|year=2011|pages=142–145|doi=10.1038/474142a|pmid=21654779|doi-access=free}}

=Flame=

{{main|Flame (malware)}}

In May 2012, Kaspersky Lab identified the malware Flame, which a researcher described as potentially "the most sophisticated cyber weapon yet unleashed".{{cite news|url=https://www.pcmag.com/article2/0,2817,2404951,00.asp|title=Massive 'Flame' Malware Stealing Data Across Middle East|first=Chloe|last=Albanesius|date=May 28, 2012|work=PC World|access-date=May 29, 2012}} According to the researchers in Kaspersky Lab, the malware had infected an estimated 1,000 to 5,000 machines worldwide{{cite news|url=http://timesofindia.indiatimes.com/tech/enterprise-it/security/Flame-virus-Five-facts-to-know/articleshow/13640158.cms|title=Flame virus: Five facts to know|date=May 29, 2012|work=The Times of India}}{{cite news|url=https://www.telegraph.co.uk/news/worldnews/middleeast/iran/9295938/Flame-worlds-most-complex-computer-virus-exposed.html |archive-url=https://ghostarchive.org/archive/20220112/https://www.telegraph.co.uk/news/worldnews/middleeast/iran/9295938/Flame-worlds-most-complex-computer-virus-exposed.html |archive-date=January 12, 2022 |url-access=subscription |url-status=live|title=Flame: world's most complex computer virus exposed|first1=Damien|last1=McElroy|first2=Christopher|last2=Williams|date=May 28, 2012|work=The Telegraph|access-date=May 29, 2012|location=London}}{{cbignore}} when asked by the United Nations International Telecommunication Union to investigate reports of a virus affecting Iranian Oil Ministry computers.{{cite magazine|url=https://www.wired.com/threatlevel/2012/05/flame/|title=Meet 'Flame', The Massive Spy Malware Infiltrating Iranian Computers|first=Kim|last=Zetter|date=May 28, 2012|magazine=Wired|access-date=May 29, 2012}} As Kaspersky Lab investigated, they discovered an MD5 hash and filename that appeared only on customer machines from Middle Eastern nations. After discovering more pieces, researchers dubbed the program "Flame" after the name of one of its modules.

Flame was an earlier variant of Stuxnet. Kaspersky never verified the source of the software, but it is suspected to have been developed by the National Security Agency (NSA) to transmit keystrokes, Skype calls and other data.{{cite magazine|last=Zetter|first=Kim|title=Meet 'Flame,' The Massive Spy Malware Infiltrating Iranian Computers|magazine=Wired|date=August 23, 2010|url=https://www.wired.com/2012/05/flame/|access-date=April 25, 2016}}{{cite news|url=https://www.pcmag.com/article2/0,2817,2404951,00.asp|title=Massive 'Flame' Malware Stealing Data Across Middle East |first=Chloe|last=Albanesius|date=May 28, 2012|work=PC World|access-date=May 29, 2012}} Kaspersky created algorithms to find similar malware and found Gauss that July, which collected and transmitted data from devices infected by bluetooth or USB drives.{{cite web|last=Goodin|first=Dan|title=Puzzle box: The quest to crack the world's most mysterious malware warhead|website=Ars Technica|date=March 14, 2013|url=https://arstechnica.com/security/2013/03/the-worlds-most-mysterious-potentially-destructive-malware-is-not-stuxnet/|access-date=April 25, 2016}}

=Red October=

{{main|Red October (malware)}}

In January 2013, Kaspersky discovered the Red October malware, which had been used for widespread cyber-espionage for five years. It targeted political targets like embassies, nuclear sites, mostly in Europe, Switzerland and North America. The malware was likely written by Russian-speaking hackers and the exploits by Chinese hackers.{{cite web|last=Ngak|first=Chenda|title=Kaspersky Labs finds 'Red October' cyber-espionage malware|website=CBS News|date=January 14, 2013|url=http://www.cbsnews.com/news/kaspersky-labs-finds-red-october-cyber-espionage-malware/|access-date=April 30, 2016}}{{cite news|last=Perlroth|first=Nicole|title=Security Firm Discovers Cyber-Spy Campaign|newspaper=The New York Times|date=January 14, 2013|url=http://bits.blogs.nytimes.com/2013/01/14/security-firm-discovers-global-spy-campaign/|access-date=April 30, 2016}} That June, Kaspersky discovered NetTraveler, which it said was obtaining data on emerging technology from government targets and oil companies. Kaspersky did not identify who was behind it, but it was similar to other cyber-espionage coming from Beijing, China.{{cite web|last=Liberto|first=Jennifer|title=New Chinese hacker group targets governments and nuclear facilities|website=CNN Money|date=June 4, 2013|url=https://money.cnn.com/2013/06/04/technology/security/cyber-hacker-group/index.html|access-date=May 1, 2016}}{{cite web|last=Wagenseil|first=Paul|title='NetTraveler' Online Espionage Campaign Linked to China|website=MSNBC|date=June 5, 2013|url=http://www.nbcnews.com/id/52099793/ns/technology_and_science-tech_and_gadgets/t/nettraveler-online-espionage-campaign-linked-china/|archive-url=https://web.archive.org/web/20161107220840/http://www.nbcnews.com/id/52099793/ns/technology_and_science-tech_and_gadgets/t/nettraveler-online-espionage-campaign-linked-china/|url-status=dead|archive-date=November 7, 2016|access-date=May 1, 2016}} Later that same year, Kaspersky discovered a hacker group it called Icefog after investigating a cybersecurity attack on a Japanese television company. Kaspersky said the hacker group, possibly from China, was unique in that they targeted specific files they seemed to know about before planting malware to extract them.{{cite news|last=Sonne|first=Paul|title=Kaspersky: 'Hit and Run' Cyber-Espionage Hackers Emerge|newspaper=The Wall Street Journal|date=September 25, 2013|url=https://blogs.wsj.com/digits/2013/09/25/kaspersky-hit-and-run-cyber-espionage-hackers-emerge/|access-date=May 1, 2016}}{{cite web|last=Menn|first=Joseph|title=Hacker mercenaries linked to Japan, South Korea spying – researchers|website=Reuters|date=September 25, 2013|url=https://www.reuters.com/article/cyberattacks-china-idUSL2N0HJ2AS20130925|access-date=May 1, 2016}}

=Mask=

In February 2014, Kaspersky identified the malware Mask, which infected 380 organizations in 31 countries. Many organizations that were affected were in Morocco. Some of the files were in Spanish and the group is believed to be a state conducting espionage, but Kaspersky did not speculate on which country may have developed it.{{cite web|title=Mask malware takes aim at governments and activists|website=BBC News|date=February 11, 2014|url=https://www.bbc.com/news/technology-26136412|access-date=April 30, 2016}}{{cite news|title=This malware is frighteningly sophisticated, and we don't know who created it|newspaper=Washington Post|date=February 10, 2014|url=https://www.washingtonpost.com/news/the-switch/wp/2014/02/10/this-malware-is-frighteningly-sophisticated-and-we-dont-know-who-created-it/|first=Timothy|last=Lee|access-date=April 30, 2016}}

=Regin=

{{main|Regin (malware)}}

In November 2014, Symantec and Kaspersky authored papers that contained the first disclosure of malicious software named Regin.{{cite web|last=Constantin|first=Lucian|title=Source code reveals link between NSA and Regin cyberespionage malware|website=PC World|date=January 27, 2015|url=http://www.pcworld.com/article/2876112/link-between-nsa-and-regin-cyberespionage-malware-becomes-clearer.html|access-date=April 25, 2016}} According to Kaspersky, Regin is similar to QWERTY, a malware program discovered the next year.{{cite web|last=Osborne|first=Charlie|title=Infamous Regin malware linked to spy tools used by NSA, Five Eyes intelligence|website=ZDNet|date=January 28, 2015|url=https://www.zdnet.com/article/infamous-regin-malware-linked-to-spy-tools-used-by-nsa-five-eyes-intelligence/|access-date=April 25, 2016}} Regin was used to take remote control of a computer and is believed to have originated from the Five Eyes alliance.{{cite web|title=Researchers link QWERTY keylogger code to NSA and Five Eye's Regin espionage malware|website=Network World|date=January 27, 2015|url=http://www.networkworld.com/article/2875739/microsoft-subnet/researchers-link-qwerty-keylogger-code-to-nsa-and-five-eyes-regin-espionage-malware.html|archive-url=https://web.archive.org/web/20150131080447/http://www.networkworld.com/article/2875739/microsoft-subnet/researchers-link-qwerty-keylogger-code-to-nsa-and-five-eyes-regin-espionage-malware.html|url-status=dead|archive-date=January 31, 2015|access-date=April 25, 2016}} That same month Kaspersky reported on the Darkhotel attack, which targeted users of wireless networks at hotels in Asia. It asked users to update their software, and then download malware that gave up their passwords.{{cite news|last=Fleisher|first=Lisa|title=Cybercrime Gang Targets Execs Using Hotel Internet|newspaper=The Wall Street Journal|date=November 10, 2014|url=https://blogs.wsj.com/digits/2014/11/10/cybercrime-gang-targets-execs-using-hotel-internet/|access-date=May 1, 2016}}{{cite web|last=Hu|first=Denni|title=Darkhotel Bug Targets Executives Traveling in Asia, Report Says|website=Bloomberg|date=November 10, 2014|url=https://www.bloomberg.com/news/articles/2014-11-10/darkhotel-malware-spies-on-traveling-executives-report-says|access-date=May 1, 2016}}{{cite web|last=Auchard|first=Eric|title=Execs in Asian luxury hotels fall prey to cyber espionage: study|website=Reuters|date=November 10, 2014|url=https://www.reuters.com/article/us-cybersecurity-hotels-idUSKCN0IU0WB20141110|access-date=May 1, 2016}}

=Equation Group=

{{main|Equation Group}}

In 2015, Kaspersky identified a highly sophisticated threat actor that it called "The Equation Group". The group incorporated sophisticated spying software into the firmware of hard drives at banks, government agencies, nuclear researchers and military facilities, in countries that are frequent targets of US intelligence efforts.{{cite news|title=Kaspersky links US to spread of PC spyware across 30 countries|newspaper=Financial Times|date=March 25, 2015|url=http://www.ft.com/cms/s/0/4d4a8f9c-b668-11e4-95dc-00144feab7de.html#axzz46qMUFcNY|access-date=April 25, 2016}} It is suspected to have been developed by the National Security Agency (NSA) and included many unique technical achievements to better avoid detection.{{cite web|last=Goodin|first=Dan|title=How 'omnipotent' hackers tied to NSA hid for 14 years—and were found at last|website=Ars Technica|date=February 16, 2015|url=https://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/|access-date=April 25, 2016}} That same day, Kaspersky announced the discovery of a hacker group it called Carbanak, which was targeting banks and moving millions of dollars into fake accounts. Carbanak was discovered when one bank asked Kaspersky to investigate suspicious behavior from its ATMs.{{cite news|title=The Kaspersky equation|newspaper=The Economist|date=February 21, 2015|url=https://www.economist.com/news/business/21644154-russian-antivirus-firm-impresses-sceptics-again-kaspersky-equation|access-date=April 24, 2016}} A similar malware using some of the same techniques as Carbanak was discovered in 2016 and dubbed Carbanak 2.0.{{cite news|title=Kaspersky confirms return of Carbanak and two more banking APT groups|newspaper=SC Magazine|date=February 9, 2016|url=http://www.scmagazine.com/news/kaspersky-confirms-return-of-carbanak-and-two-more-banking-apt-groups/article/472224/|access-date=April 25, 2016|first=Rio|last=Perez}}

=Duqu=

{{main|Duqu}}

In June 2015, Kaspersky reported that its own network had been infiltrated by government-sponsored malware. Evidence suggested the malware was created by the same developers as Duqu and Stuxnet, in order to get intelligence that would help them better avoid detection by Kaspersky in the future. Kaspersky called it Duqu 2.0.{{cite magazine|last=Zetter|first=Kim|title=Kaspersky Finds New Nation-State Attack—In Its Own Network|magazine=Wired|date=December 9, 2014|url=https://www.wired.com/2015/06/kaspersky-finds-new-nation-state-attack-network/|access-date=April 25, 2016}} The malicious software resided in memory to avoid detection. The hack was believed to have been done by the same group that did Duqu in 2011. It used exploits in Microsoft installer files.{{cite web|title=Kaspersky Lab cybersecurity firm is hacked|website=BBC News|date=June 10, 2015|url=https://www.bbc.com/news/technology-33083050|access-date=April 25, 2016}}

=Android cyber-espionage=

{{main|Hacking Team}}

In June 2015, Kaspersky Lab and Citizen Lab both independently discovered software developed by Hacking Team and used by 60 governments around the world to covertly record data from the mobile phones of their citizens. The software gave police enforcement a "menu of features" to access emails, text messages, keystrokes, call history and other data.{{cite magazine|last=Zetter|first=Kim|title=Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones|magazine=Wired|date=June 24, 2014|url=https://www.wired.com/2014/06/remote-control-system-phone-surveillance/|access-date=May 1, 2016}}{{cite web|title=Police learning surveillance tricks from hackers, cybersecurity experts say|website=CBS News|date=June 24, 2014|url=http://www.cbsnews.com/news/police-learning-surveillance-tricks-from-hackers-cybersecurity-experts-say/|access-date=May 1, 2016}}{{cite web|title=Eyes on you: Experts reveal police hacking methods|website=USA Today|date=June 25, 2014|url=https://www.usatoday.com/story/tech/2014/06/25/police-hacking-methods/11348497/|access-date=May 1, 2016}} Kaspersky also identified 37,000 attacks against banking companies that used modifications of the malware called Asacub and took control of Android devices. Asacub targeted mostly banking customers in the US, Russia and Ukraine using an SMS message that baited users into installing a Trojan.{{cite news|last=Barth|first=Bradley|title=Kaspersky detects surge in 'Asacub' mobile banking trojan attacks|newspaper=SC Magazine|date=January 21, 2016|url=http://www.scmagazine.com/news/kaspersky-detects-surge-in-asacub-mobile-banking-trojan-attacks/article/466638/|access-date=April 6, 2016}}

=Silverlight=

In 2016, Kaspersky discovered a zero day vulnerability in Microsoft Silverlight. Kaspersky identified a string of code often used by exploits created by the suspected author. It then used YARA rules on its network of Kaspersky software users to find that string of code and uncover the rest of the exploit. Afterwards, Microsoft issued a "critical" software patch to protect its software from the vulnerability.{{cite web|last=Osborne|first=Charlie|title=Kaspersky Lab discovers Silverlight zero-day vulnerability|website=ZDNet|date=January 13, 2016|url=https://www.zdnet.com/article/kaspersky-lab-discovers-silverlight-zero-day-vulnerability/|access-date=April 24, 2016}}{{cite magazine|last=Zetter|first=Kim|title=Hacking Team's Leak Helped Researchers Hunt Down a Zero-Day|magazine=Wired|date=January 13, 2016|url=https://www.wired.com/2016/01/hacking-team-leak-helps-kaspersky-researchers-find-zero-day-exploit/|access-date=April 25, 2016}}

=Poseidon Group=

In 2016, Kaspersky uncovered the Poseidon Group, which would infiltrate corporations with malware using phishing emails, then get hired by the same company as a security firm to correct the problem. Once hired, Poseidon would install additional malware and backdoors.{{cite web|last=Jones|first=Brad|title=Kaspersky fingers 'Poseidon' for attacks dating back to 2001|website=Digital Trends|date=February 10, 2016|url=http://www.digitaltrends.com/computing/kapersky-identifies-poseidon-as-cyber-criminal-group/|access-date=April 25, 2016}} In June 2016 Kaspersky helped uncover a Russian hacking group, leading to 50 arrests.

=Titanium=

{{main|Titanium (malware)}}

In 2019, Kaspersky uncovered Titanium, a very advanced and insidious backdoor malware APT, developed by PLATINUM, a cybercrime collective. Kaspersky Lab reported the malware on November 8, 2019.{{cite news |author1=AMR (Anti-Malware Research) |author2=GReAT (Global Research & Analysis Team) |title=Titanium: the Platinum group strikes again |url=https://securelist.com/titanium-the-platinum-group-strikes-again/94961/ |date=November 8, 2019 |work=Kaspersky Lab |access-date=November 9, 2019 }}{{cite news |author= |title=Kaspersky identifies new Titanium backdoor used for attacks by notorious Platinum group in APAC region |url=http://www.globalsecuritymag.com/Kaspersky-identifies-new-Titanium,20191108,92551.html |date=November 2019 |work=Global Security Mag |access-date=November 9, 2019 }}{{cite news |last=Goodin |first=Dan |title=One of the world's most advanced hacking groups debuts new Titanium backdoor |url=https://arstechnica.com/information-technology/2019/11/newly-discovered-titanium-backdoor-employs-clever-ways-to-go-undetected/ |date=November 8, 2019 |work=Ars Technica |access-date=November 9, 2019 }}{{cite news |last=Osborne |first=Charlie |title=Platinum APT's new Titanium backdoor mimics popular PC software to stay hidden |url=https://www.zdnet.com/article/platinum-apts-new-titanium-backdoor-mimics-popular-pc-software-to-stay-hidden/ |date=November 8, 2019 |work=ZDNet |access-date=November 9, 2019 }}{{cite news |last=Ewell |first=Pauline |title=Platinum APT Shines Up New Titanium Backdoor |url=http://mashviral.com/platinum-apt-shines-up-new-titanium-backdoor/ |date=November 8, 2019 |work=MashViral |access-date=November 9, 2019 |archive-date=November 9, 2019 |archive-url=https://web.archive.org/web/20191109155017/http://mashviral.com/platinum-apt-shines-up-new-titanium-backdoor/ |url-status=dead }}{{cite news |author= |title='Platinum' Hacking Group Strikes Once more With Complicated Titanium Backdoor To Home windows |url=https://marketresearchbase.com/2019/11/09/platinum-hacking-group-strikes-once-more-with-complicated-titanium-backdoor-to-home-windows/ |date=November 9, 2019 |work=Market Research Base |access-date=November 9, 2019 |archive-date=November 9, 2019 |archive-url=https://web.archive.org/web/20191109181802/https://marketresearchbase.com/2019/11/09/platinum-hacking-group-strikes-once-more-with-complicated-titanium-backdoor-to-home-windows/ |url-status=dead }}

=MATA Toolset Campaign=

In 2020, Kaspersky published research on the MATA Toolset Campaign, a sophisticated cyber-espionage framework targeting multiple operating systems, including Windows, macOS, and Linux. The malware, attributed to the Lazarus Group, was used for stealing databases, distributing ransomware, and installing backdoors on infected systems. MATA's capabilities allowed attackers to execute a wide range of malicious activities, including exfiltrating sensitive data from corporate networks and compromising financial systems. The campaign highlighted the increasing cross-platform threat posed by state-sponsored actors. In September 2022 and October 2023, new malware samples linked to the MATA cluster were uncovered.{{Cite web|lang=en|url=https://securelist.com/mata-multi-platform-targeted-malware-framework/97746/|title=MATA: Multi-platform targeted malware framework

|website=Securelist|date=July 22, 2020 |access-date=2024-11-12|archive-date=2024-04-16|archive-url=https://web.archive.org/web/20240416182717/https://securelist.com/mata-multi-platform-targeted-malware-framework/97746/|url-status=live}}{{Cite web|lang=en|url=https://industrialcyber.co/industrial-cyber-attacks/kaspersky-data-reveals-updated-mata-attacks-targeting-industrial-companies-in-eastern-europe/|title=Kaspersky data reveals updated MATA attacks targeting industrial companies in Eastern Europe

|website=Industrial Cyber|date=October 18, 2023 |access-date=2024-12-11|archive-date=2024-08-15|archive-url=https://web.archive.org/web/20240815174621/https://industrialcyber.co/industrial-cyber-attacks/kaspersky-data-reveals-updated-mata-attacks-targeting-industrial-companies-in-eastern-europe/|url-status=live |last1=Ribeiro |first1=Anna }}{{Cite web|lang=en|url=https://www.bleepingcomputer.com/news/security/mata-malware-framework-exploits-edr-in-attacks-on-defense-firms/|title=MATA malware framework exploits EDR in attacks on defense firms

|website=Bleepingcomputer|access-date=2024-12-11|archive-date=2024-07-20|archive-url=https://web.archive.org/web/20240720111025/https://www.bleepingcomputer.com/news/security/mata-malware-framework-exploits-edr-in-attacks-on-defense-firms/|url-status=live}}

=PyPI Supply Chain Attack=

In 2024, Kaspersky uncovered a year-long supply chain attack targeting the Python Package Index (PyPI), a popular repository for Python developers. Attackers uploaded malicious packages containing JarkaStealer, a malware designed to exfiltrate sensitive information from infected systems. These packages were disguised as legitimate tools and lured victims through social engineering tactics, including AI (OpenAI's ChatGPT) chatbots offering assistance. The campaign demonstrated the vulnerability of open-source ecosystems and emphasized the importance of scrutinizing dependencies in software development.{{Cite web|lang=en|url=https://www.scworld.com/news/fake-chatgpt-claude-pypi-packages-spread-jarkastealer-malware|title=Fake ChatGPT, Claude PyPI packages spread JarkaStealer malware

|website=ScMedia|date=November 22, 2024 |access-date=2024-12-11|archive-date=2024-11-23|archive-url=https://web.archive.org/web/20241123050303/https://www.scworld.com/news/fake-chatgpt-claude-pypi-packages-spread-jarkastealer-malware|url-status=live}}{{Cite web|lang=en|url=https://cybersecuritynews.com/malicious-pypi-package-mimic-chatgpt-claude/|title=Malicious PyPi Package Mimic ChatGPT & Claude Steals Developers Data

|website=Cyber Security News|date=November 21, 2024 |access-date=2024-12-11}}

=NKAbuse Malware=

In 2023, Kaspersky exposed NKAbuse, a sophisticated multiplatform malware written in the Go programming language. This malware leveraged blockchain technology for its peer-to-peer communication infrastructure, making it resilient to takedowns. NKAbuse functioned as a flooder and a backdoor, enabling attackers to launch distributed denial-of-service (DDoS) attacks and gain persistent access to compromised systems. The campaign illustrated the evolving use of blockchain in cybercrime and reinforced the need for enhanced detection methods.{{Cite web|lang=en|url=https://securelist.com/unveiling-nkabuse/111512/|title=Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol

|website=Securelist|date=December 14, 2023 |access-date=2024-12-11|archive-date=2024-07-23|archive-url=https://web.archive.org/web/20240723144442/https://securelist.com/unveiling-nkabuse/111512/|url-status=live}}{{Cite web|lang=en|url=https://www.darkreading.com/cloud-security/nkabuse-malware-blockchain-hide-linux-iot|title=Complex 'NKAbuse' Malware Uses Blockchain to Hide on Linux, IoT Machines|website=Darkreading|access-date=2024-12-11|archive-date=2024-06-20|archive-url=https://web.archive.org/web/20240620164031/https://www.darkreading.com/cloud-security/nkabuse-malware-blockchain-hide-linux-iot|url-status=live}}

===Triangulation===

{{main|Operation Triangulation}}

In 2023, Kaspersky uncovered Triangulation, a sophisticated spyware campaign targeting iOS mobile devices. The malware exploited multiple zero-day vulnerabilities to gain full control of targeted devices. Triangulation was primarily distributed through malicious attachments in instant messaging apps. Once installed, it allowed attackers to access encrypted communications, GPS locations, and sensitive data. Kaspersky attributed the campaign to an advanced persistent threat (APT) group but refrained from naming a specific actor, though evidence suggested ties to state-sponsored espionage.{{Cite web|lang=en|url=https://www.computerweekly.com/news/366556873/Kaspersky-opens-up-over-spyware-campaign-targeting-its-staffers|title=Kaspersky opens up over spyware campaign targeting its staffers|website=ComputerWeekly|access-date=2024-12-11|archive-date=2024-06-21|archive-url=https://web.archive.org/web/20240621122440/https://www.computerweekly.com/news/366556873/Kaspersky-opens-up-over-spyware-campaign-targeting-its-staffers|url-status=live}}{{Cite web|lang=en|url=https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/|title=Operation Triangulation: The last (hardware) mystery

|website=Securelist|date=December 27, 2023 |access-date=2024-12-11|archive-date=2024-12-09|archive-url=https://web.archive.org/web/20241209012330/https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/|url-status=live}}

=CloudSorcerer/EastWind=

CloudSorcerer APT and its EastWind campaign were identified by Kaspersky in 2024.The malware leveraged public cloud infrastructure to perform large-scale data exfiltration and surveillance. The attackers used sophisticated phishing campaigns to infiltrate government and private sector organizations, especially targeting research institutions and critical infrastructure. CloudSorcerer employed novel encryption techniques to disguise data flows, complicating detection. Kaspersky linked the malware to a state-affiliated group but did not specify which country was behind the attack.{{Cite web|lang=en|url=https://www.darkreading.com/cyberattacks-data-breaches/eastwind-cyber-spy-campaign-chinese-apt-tools|title='EastWind' Cyber-Spy Campaign Combines Various Chinese APT Tools|website=Darkreading|access-date=2024-12-11|archive-date=2024-08-22|archive-url=https://web.archive.org/web/20240822172705/https://www.darkreading.com/cyberattacks-data-breaches/eastwind-cyber-spy-campaign-chinese-apt-tools|url-status=live}}{{Cite web|lang=en|url=https://www.ccn.com/news/technology/china-hackers-breach-russian-agencies-malware-kaspersky/|title=China-Linked Hackers Breach Russian Agencies With Sophisticated Malware, Kaspersky Reveals Widespread Espionage Campaign

|website=CCN|date=August 15, 2024 |access-date=2024-12-11|archive-date=2024-08-15|archive-url=https://web.archive.org/web/20240815133541/https://www.ccn.com/news/technology/china-hackers-breach-russian-agencies-malware-kaspersky/|url-status=live}}

=DuneQuixote=

In 2024, Kaspersky exposed DuneQuixote, a stealthy malware campaign targeting intellectual property in the technology and energy sectors. The malware used custom-built exploits and employed fileless techniques, operating entirely in memory to evade detection by traditional security tools. DuneQuixote's attack vector included compromised software updates and supply chain vulnerabilities. Kaspersky attributed the operation to a well-funded APT group with global reach, though the precise origin remained unclear. The discovery highlighted the growing complexity of threats targeting high-value intellectual assets.{{Cite web|lang=en|url=https://urgentcomm.com/cybersecurity/-dunequixote-shows-stealth-cyberattack-methods-are-evolving-can-defenders-keep-up-|title='DuneQuixote' shows stealth cyberattack methods are evolving. Can defenders keep up?|website=Urgent Communications|access-date=2024-12-11}}

= SparkCat =

In February 2025 discovers SparkCat, a first OCR infostealer found in iOS App Store.{{Cite web |title=SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images |url=https://thehackernews.com/2025/02/sparkcat-malware-uses-ocr-to-extract.html |access-date=2025-03-22 |website=The Hacker News |language=en}} On iOS and Android, infostealer requests access to users' photo galleries when they attempt to use support chat in an infected app. Once granted permission, the malware uses Google's OCR technology to decipher text in photos and looks for screenshots of passwords or phrases to regain access to cryptocurrency, then sends them to the attacker.{{Cite web |last=Davis |first=Wes |date=2025-02-05 |title=iOS App Store apps with screenshot-reading malware found for the first time |url=https://www.theverge.com/news/606649/ios-iphone-app-store-malicious-apps-malware-crypto-password-screenshot-reader-found |access-date=2025-04-22 |website=The Verge |language=en-US}} By February 10, 2025, Apple and Google had removed about 20 apps from their app stores, but the malware remained available in unofficial stores and websites.{{Cite web |last=Singh |first=Jagmeet |date=2025-02-11 |title=Apple and Google take down malicious mobile apps from their app stores |url=https://techcrunch.com/2025/02/10/apple-and-google-take-down-malicious-apps-from-their-app-stores/ |access-date=2025-04-22 |website=TechCrunch |language=en-US}}

Bans and allegations of Russian government ties

{{Main|Kaspersky bans and allegations of Russian government ties}}

Since 2015, Kaspersky has faced allegations of close ties to the Russian government by various Western media outlets and governments. In October 2017, reports alleged that hackers working for the Russian government stole confidential data from the home computer of a US National Security Agency (NSA) contractor via Kaspersky antivirus software. Kaspersky denied the allegations, reporting that the software had detected Equation Group malware samples which it uploaded to its servers for analysis in its normal course of operation.{{cite news |last1=Goodin |first1=Dan |date=November 16, 2017 |title=Kaspersky: Yes, we obtained NSA secrets. No, we didn't help steal them |url=https://arstechnica.com/information-technology/2017/11/kaspersky-yes-we-obtained-nsa-secrets-no-we-didnt-help-steal-them/ |access-date=December 29, 2022 |work=Ars Technica |language=en-us}}

In September 2017, the Department of Homeland Security issued an order prohibiting the use and purchase of Kaspersky software by US federal agencies, and required their removal from systems within 90 days. In December, President Donald Trump signed the National Defense Authorization Act for Fiscal Year 2018, which included a ban on Kaspersky software on federal civilian and military computers.{{cite news |title=Trump signs into law U.S. government ban on Kaspersky Lab software |newspaper=Reuters |date=December 12, 2017 |url=https://www.reuters.com/article/us-usa-cyber-kaspersky/trump-signs-into-law-u-s-government-ban-on-kaspersky-lab-software-idUSKBN1E62V4 |access-date=November 30, 2018}} In response, Kaspersky began a "global transparency initiative", which included relocating core infrastructure and data for customers in North America and Europe from Russia to Switzerland, and opening "transparency centres" in multiple countries to allow state agencies, government experts and regulators to review its source code and other company practices.{{Cite web |last=Fitzgerald |first=Jay |title=Kaspersky Opens New 'Transparency Centers' Amid Concerns Over Possible Russian Ties |url=https://www.crn.com/news/security/kaspersky-opens-new-transparency-centers-amid-concerns-over-possible-russian-ties |access-date=2024-06-21 |website=CRN}}{{cite web |date=November 17, 2020 |title=Kaspersky shuts down data-processing activities in Russia |url=https://www.computerweekly.com/news/252492217/Kaspersky-shuts-down-data-processing-activities-in-Russia?asrc=EM_EDA_140344152 |website=Computer Weekly}}

In 2022, after the Russian invasion of Ukraine, the US government warned American businesses that the risk of using Kaspersky software had increased and the FCC added Kaspersky to its list of threats to US national security.{{cite news |title=Exclusive: U.S. warned firms about Russia's Kaspersky software day after invasion |newspaper=Reuters |date=March 31, 2022 |url=https://www.reuters.com/technology/exclusive-us-warned-firms-about-russias-kaspersky-software-day-after-invasion-2022-03-31 |access-date=March 31, 2022}} Kaspersky responded to the FCC's move in a press release on its website, saying that the agency's decision was "made on political grounds" in light of Russia's invasion of Ukraine, and that the company "remains ready to cooperate with US government agencies to address the FCC's and any other regulatory agency's concerns".{{Cite web|url= https://www.kaspersky.com/about/press-releases/2022_kaspersky-statement-on-the-fcc-public-notice|title= Kaspersky statement on the FCC public notice|date= March 26, 2022|website=Kaspersky Lab}}

In 2024, hacked email accounts showed that Kaspersky Lab has allegedly helped the Russian government develop software for its spy drones.{{cite web | url=https://www.twz.com/news-features/ukraine-situation-report-frontline-defenses-deteriorating-under-russian-pressure | title=Ukraine Situation Report: Frontline Defenses Deteriorating Under Russian Pressure | date=April 29, 2024 }}

In April 2024, it was reported that the US Department of Commerce was considering a general ban on Kaspersky from offering its products in the country.{{Cite web |last=Lyngaas |first=Sean |date=2024-04-09 |title=Biden administration preparing to prevent Americans from using Russian-made software over national security concern {{!}} CNN Politics |url=https://www.cnn.com/2024/04/09/politics/biden-administration-americans-russian-software/index.html |access-date=2024-06-21 |website=CNN |language=en}} On 20 June 2024, Secretary of Commerce Gina Raimondo announced that Kaspersky Labs would be prohibited from selling or providing updates for its software to customers in the United States. The sales ban takes effect on 20 July 2024 and software updates to customers must end on 29 September 2024. The sanction is performed under executive orders issued by Trump and Joe Biden, which seek to protect the personal data of US citizens from nations designated as "foreign adversaries" to the United States.{{Cite web |last=Valle |first=Gaby Del |date=2024-06-20 |title=Biden administration to ban Russian company's antivirus software |url=https://www.theverge.com/2024/6/20/24182531/kaspersky-lab-antivirus-software-banned-us-biden-russia |access-date=2024-06-21 |website=The Verge |language=en}} In July 2024, Kaspersky said it would close its United States division and lay off all employees ahead of the July 20 ban.{{Cite web |last=Zetter |first=Kim |date=2024-07-15 |title=Kaspersky Lab Closing U.S. Division; Laying Off Workers |url=https://www.zetter-zeroday.com/kaspersky-lab-closing-u-s-division-laying-off-workers-2/ |access-date=2024-07-15 |website=ZERO DAY |language=en}} From July 17, the company offered US customers six months of free updates for the Kaspersky security suites, password manager, parental controls software, and VPN. However, it acknowledged that functionality would become limited after September 29.{{Cite web |last=Lyons |first=Jessica |date=July 17, 2024 |title=Kaspersky gives US customers six months of free updates as a parting gift |url=https://www.theregister.com/2024/07/17/kaspersky_goodbye_gift/ |access-date=July 20, 2024 |website=The Register}}

In February 2025, Australia banned Kaspersky software from government systems due to concerns over national security. The Department of Home Affairs issued a directive prohibiting the installation of Kaspersky products on government devices, citing risks of foreign interference, espionage, and sabotage. Government agencies must remove all existing Kaspersky software by April 1, 2025. This decision aligns Australia with other members of the Five Eyes intelligence pact, including the U.S., Canada, and the U.K., which have also restricted Kaspersky's use.{{Cite web |last=Page |first=Carly |date=2025-02-24 |title=Australia bans government use of Kaspersky software due to ‘unacceptable security risk’ |url=https://techcrunch.com/2025/02/24/australia-bans-government-use-of-kaspersky-software-due-to-unacceptable-security-risk/ |access-date=2025-02-25 |website=TechCrunch |language=en-US}}

See also

Notes

{{notelist}}

References

{{Reflist}}