More Vipre scare tactics aimed at Kaspersky customers? Do you still trust Kaspersky or VIPRE?

Discussion in 'Vipre (ThreatTrack)' started by BigWrench, Oct 17, 2017.

  1. BigWrench

    BigWrench Level 3

    Apr 13, 2014
    143
    409
    Windows 10
    ESET
    #1 BigWrench, Oct 17, 2017
    Last edited by a moderator: Oct 17, 2017
    Kaspersky Lab Used by Russia as a Tool to Spy on the U.S.

    Well....What do you all think?
     
    ZeroDay, BryanB, davisd and 7 others like this.
  2. mlnevese

    mlnevese Level 10

    May 3, 2015
    473
    1,969
    Windows 10
    Kaspersky
    Vipre went to my "Will never buy" list for tactics like that... I'm still waiting for any evidence against Kaspersky...
     
    upnorth, insanity, aragornnnn and 9 others like this.
  3. venustus

    venustus Level 43
    Content Creator Trusted

    Dec 30, 2012
    3,226
    16,096
    Sydney
    Windows 10
    Kaspersky
    A "dirty" ploy by Viper,or has the NSA bought them out!!:ROFLMAO:
     
    aragornnnn, davisd, plat1098 and 8 others like this.
  4. Weebarra

    Weebarra Level 7

    Apr 5, 2017
    341
    8,400
    Somewhere in Scottieland
    Windows 7
    Kaspersky
    #4 Weebarra, Oct 18, 2017
    Last edited: Oct 18, 2017
    Is this not the same as we have all been discussing for the last couple of weeks ? Maybe i'm wrong (which is highly likely :confused:) but my view still stands, unless someone can prove categorically that Kaspersky colluded with the Russian government then yes i will still trust them. Don't know anything about vipre really but going by the comments, they are not to be trusted.
     
    ZeroDay, insanity, davisd and 8 others like this.
  5. In2an3_PpG

    In2an3_PpG Level 10

    Nov 15, 2016
    495
    8,287
    IT Jr. Network Admin
    United States
    Windows 10
    Default-Deny
    The company i work for uses Vipre unfortunately. Even though there are companies out there twice as good but i can never convince anyone of switching (laziness on the part of my fellow coworkers). So I'm stuck with it. I can tell you that i am personally getting tired of seeing emails like this one from Vipre. Trying to convince people that Kaspersky is evil. Sad thing is its actually working for my coworkers though. They believe anything Vipre sends them since they have been dealing with them for so long. I on the other hand never got around to appreciating anything Vipre offers and this crap their doing makes it even worse.
     
    frogboy, BryanB, davisd and 5 others like this.
  6. Syafiq

    Syafiq Level 7

    May 8, 2017
    331
    2,134
    Student
    Indonesia
    Windows 10
    Emsisoft
    Well, i'm not using Vipre. But after reading this, I will never buy it ! I'm listed Vipre as my 'Untrusted' vendors list (n) I will still trust Kaspersky (y)
     
    ZeroDay, In2an3_PpG, frogboy and 6 others like this.
  7. ravi prakash saini

    Apr 22, 2015
    604
    3,199
    india
    Windows 10
    Kaspersky
    so many efforts to make kaspersky culpirit ,make me believe that they are clean
     
    BryanB, frogboy, bribon77 and 5 others like this.
  8. BigWrench

    BigWrench Level 3

    Apr 13, 2014
    143
    409
    Windows 10
    ESET
    UPDATE.....
    Got an email from Vipre this morning, directing me to another new deal :eek:

    "Kreeped Out by Kaspersky Ties to the Kremlin?

    The Wall Street Journal, Washington Post and New York Times have all reported that software from Kaspersky Lab was used by the Russian government as a tool for espionage.

    A security solution is supposed to bring you comfort and peace of mind—and most of all, keep you safe from this very sort of intrusion! If an incident like this has you feeling unsettled, don’t panic. Switch to VIPRE today for the highest-rated antivirus and anti-malware solution, headquartered right here in the United States, right now available for up to $35 off!*

    Don’t be a victim. Bite back against malware—and foreign spies!—with VIPRE!
    ":sleep:

    Switch to VIPRE - VIPRE

    Just sad. a much better company when it was Sunbelt.:cry:
     
    In2an3_PpG, Weebarra, davisd and 6 others like this.
  9. bribon77

    bribon77 Level 10

    Jul 6, 2017
    487
    3,357
    spain
    Windows 7
    Emsisoft
  10. plat1098

    plat1098 Level 5

    Aug 23, 2017
    227
    1,331
    Brooklyn
    Windows 10
    Microsoft
    Vipre's tactics may be dirty pool, but it's business. Sheer opportunistic business and nothing illegal about it. To many of us, this is repugnant and inflammatory. To Vipre, it's like digging for rocks and hitting a perfect vein of gold--strike while it's hot. I know, right?
     
    Umbra, Weebarra, davisd and 6 others like this.
  11. bribon77

    bribon77 Level 10

    Jul 6, 2017
    487
    3,357
    spain
    Windows 7
    Emsisoft
    Yes, Business is business.
     
    Umbra, Weebarra, davisd and 5 others like this.
  12. JoeBlack40

    JoeBlack40 Level 5

    Sep 28, 2011
    247
    413
    Windows 7
    Kaspersky
    I was,i am and always be VIPRE-free!:giggle:(y)
    But instead,i love Kaspersky free!(y)
     
    Weebarra, davisd, BryanB and 3 others like this.
  13. BigWrench

    BigWrench Level 3

    Apr 13, 2014
    143
    409
    Windows 10
    ESET
    Weebarra, davisd, BryanB and 2 others like this.
  14. BigWrench

    BigWrench Level 3

    Apr 13, 2014
    143
    409
    Windows 10
    ESET
    upload_2017-10-18_18-44-31.jpeg

    Love it!!!(y):LOL::ROFLMAO:
     
    upnorth, Weebarra, davisd and 4 others like this.
  15. venustus

    venustus Level 43
    Content Creator Trusted

    Dec 30, 2012
    3,226
    16,096
    Sydney
    Windows 10
    Kaspersky
    #15 venustus, Oct 18, 2017
    Last edited: Oct 18, 2017
    As you all probably noticed (for it was not very difficult to notice) in September-October, the American press has openly persecuted our company. The waterfall of the accusations hit us. It has not been a week that the next bloomberg media giant has not rolled out the latest libel about Russian hackers and the Kremlin's hand, who in some unknown way through our products spy on American users and hunt for their secrets.

    The media attack was massive, well-organized and large-caliber - for some time it was necessary to "sit out in the trench". But now it's been almost a whole week without major raids, you can get up, answer all these accusations and ask your questions. Right now, since the respite is obviously short. In late October and early November, regular hearings are scheduled for the US Congress and I do not rule out that the American media artillery will start talking again.

    So, what was that.

    It all began a long time ago, even in the distant 1990s, when we timidly entered the US market. Even then, some American competitors were concerned and began to whisper to customers about our origins, about "KGB agents and Moscow's long arm". Although what were we then his competitors? So, within the boundaries of the static error - our turnover was hundreds of times smaller than the market leaders. Similar "whisperings" happened and then, but at the level of corporate gossip.

    This went on until the beginning of 2010, when charges on a national basis began to appear periodicallyand in the "top-level" press, which I personally had not previously seen in such behavior. Evidence of "the hands of Russian hackers" were based, for example, on the fact that our office in Moscow is "10 miles from the Kremlin." Than not an argument !? Year after year, such articles appeared more and more often, until, at last, this year they turned into a stream of frank paranoia about the links between "Russian state hackers", the Kremlin and your humble servant.

    The chronology of events since May of this year:

    1. May 9. They talked about the Memorandum of Coates and Sessions, where they warn about the possible dangers of LK products. The memorandum is secret, that there - in details it is not known. But in general - "a terrible ubiquitous antivirus, a danger to national security, the LC can be influenced by the Kremlin."

    A hearing in the Senate with intelligence chiefs about Russia's interference in US elections, unexpectedly turned to LK products in sharply negative tones.

    The clouds thickened and the first thunder broke in June:

    3. June 28. It became known that the FBI is interrogating the employees of the US office of the LC, and the senators want to ban our products in the US public sector.
    4. At the same time, June 28 - the senators offered to ban our products in the US Army ( although we never had our software in the US Defense Department ).

    And then it went (you can without translation, and so everything is clear):

    July 11, Bloomberg's doublet :
    5. Why US Officials Are Worried About This Russian Firm.
    6.Kaspersky Lab Has Been Working With Russian Intelligence.

    7. August 22 : Rob Joyce, President Donald Trump's administration's cybersecurity coordinator, advised by Kaspersky Labs.
    8. September 4: NY Times, "The Russian Company That Is Danger to Our Security"
    9. September 13: Washington Post, "US moves to ban"

    October 5, doublet:
    10. Wall Street Journal , "Russian Hackers Stole Data on US Cyberdefense"
    11. Washington Post: "Russian government hackers used antivirus software to steal US cyber capabilities"

    // then especially ... surprised (it's very soft and politically correct) Washington politicians who admitted that decisions against us are based mainly on information from open sources - that is, "read on the Internet"!

    Next:

    12. October 10 : The New York Times, "NYT: How Israel Caught Russian Hackers Scouring the World for US Secrets"

    October 11, again a doublet:
    13. Washington Post, "Israel hacked by Kaspersky, then tipped the NSA that its tools had been breached "
    14. Wall Street Journal," Russia Has Turned Kaspersky Software Into Tool for Spying "

    We watched such mask-shows this year and not at all on TV. Moreover, I'm sure they are not over yet. The American "top" press has attacked us almost in its entirety - by the way, thanks for branding! - and they lied fantasized they sync as if on command, but were confused at this in detail. Some said that the secret services allegedly shoved their code into our databases, others - that by anonymous rumors we ourselves are a spy for users, yet others - that this is just some potential danger and an unknown threat.

    In this case, no factual evidence was presented not once . Not once in the whole history of such raids and accusations! (read - for all 20 years of the company's existence). But it's all clear and obvious - if there were any evidence, we would have been buried long ago! From the markets endured and for much less sins.

    Again. The charges against us are serious enough. What are the actual evidence that lie under these accusations? And no at all !

    You did not misinterpret. No facts, evidence, no evidence! And it can not be.

    When such serious accusations are made, it is customary in a civilized society to present evidence, or at least names / photos of victims. In the case of technical espionage (which include cyberattacks), they provide means of espionage. In the cyber world - the names of modules, the location of the code, its disassembler (or part). Approximately as we have in our reports about the most difficult and interesting incidents (read here ).

    In our case, there was nothing of this ( presumption of innocence? No, not heard! ). All accusations are based on "knowledgeable sources close to the topic", plus conversations with anonymous witnesses, plus references to "classified information" and other rumors (roughly like "riding in an elevator and that's what I heard").

    What kind of "secret information" can there be and what are "knowledgeable sources" if all our products and updates are on the servers in public access? Buy a box in a nearby supermarket or online any versions - analyze, decompile and disassemble! Though from morning till night and without days off, if there is such a desire.

    and records in database updates - there is no mysterious magic here (just like all other software companies). Both products and bases are completely and completely accessible on public servers. Old products and all updates - in backups. If they have at least some undeclared (spyware) functionality that violates the confidentiality of our users' information - tell us the product name, the module name, the address of the suspect code or the update number and the record ID. Only such technical information is accepted for consideration - but we will treat it as seriously as possible, down to an internal investigation. If such information is provided. If it is not - then this means deliberate lies, or else the broadcast of someone else's lies and falsifications.

    I repeat the previous thought. Only facts are considered for consideration: names, addresses, dumps, disassembled code. All the rest - known or broadcast lies, rumors, slander, falsification. Regardless of the level and "respect" of the translator.

    Again. The behavior of our products is determined solely by the logic of the algorithms in the software modules and the contents of the databases. Last time, a complete audit of the source code for products and database records was conducted in the spring and summer 2015 due to the compromise of our network by the spyware malware "Duku-2". No software bookmarks were found - neither in products, nor in bases and updates. We are conducting a similar audit right now. Moreover, we are ready to invite external observers with expertise in the field of computer security for additional audit. I am absolutely sure that nothing unexpected will be discovered.

    I personally answer for the fact that the company's products and updates do not contain any spyware / malicious / undeclared functionality. And I personally declare that all the company's accusations of espionage for [American] users are unsubstantiated paranoia (at best).

    Once again, the recent persecution of our company is paranoia, the fire of the Inquisition and the witch hunt .

    Yes, our products have the rights to deeply scan the system and files (as well as all the software category "utilities"). Yes, we check files for malicious code. Yes, we specifically monitor and calculate the suspicious behavior of unknown objects in the system - and, in full accordance with the declared functionality , we transfer them to the cloud for further analysis (and only if the corresponding option is included - by the way, almost all existing antiviruses do this). It's all sharpened and optimized exclusively for catching malware, neutralizing and protecting our users, which we do best in the world. Our job is to protect users and their data. Sight, spying, eavesdropping and sniffing are engaged in a variety of spy agencies, which we periodically catch and tell the whole world about it.

    Like everything explained in detail? Now, on the merits of the question: what was it and to whom is it profitable? What are the options?

    1. Search of competitors.

    About this I thought in the first place.

    Immediately a similar story arises with the company Huawei, which in early 2010, without any evidence, was accused of backdoors in network equipment and espionage for the exploration of China. Accused for a long time, closely, also using the leading American media. Do not be lazy, google it in the news of 2010-2012. If we compare with accusations in our address - yes there they just have a template of some kind! Standard methodology, about the same words, the same committees, the Congress and so on. All one-to-one.

    And then all this took place against the backdrop of a tender for the supply of equipment in a very multi-billion-dollar project "Total Internet Australia" by the National Broadband Network . But some time passed, the tender for the supply was won by Cisco, in the equipment of Huawei the backdoors were never found - and everything calmed down.

    In our case, the scale of collisions is comparable, but billions of contracts do not even loom over the horizon. In short, I do not believe in the theory of envious competitors: the scale of the attack does not break with the volume of our business (in general, not just in the US).

    2. Political.

    All this is very similar to the Soviet single impulse "Pasternak did not read, but I condemn" in its worst manifestations. But our company and I personally always distanced ourselves from politics, therefore this theory does not look convincing either.

    3. Disassembly of the Kremlin and the Capitol.

    Also a promising topic, but we will somehow be shallow. There are companies richer and more public. Also discarded.

    4. I'm here as a deliriumstill offered "international cybercriminal", which paid the Washington lobbyists, etc. Technically, this is possible. Cybernews has enough money, political mechanisms on the Hill and around, too, enough, but for some reason I do not believe. "I do not believe!" (c) Stanislavsky. It would be quite an acute paranoia, but already in my execution.

    5. Some unknown and very unfortunate combination of the above theories .

    Everything can be. The answer to this riddle is not yet known to us.

    One thing is clear, that we crossed the road very seriously. To whom? Why did this happen just now? Why us, and not someone else?

    While these questions do not have answers. But sooner or later we will find out what it was and who was behind it. Marinate popcorn with barrels and fasten your seat belts, this is not the end of the story. I'm afraid it's not even the middle. Ahead will be a lot of fun and interesting.

    But I once again declare and answer for my words:

    The main priority of the company is to protect its users from all kinds of cyber threats, regardless of their origin. And the fact that we do it better than the rest is not our fault, but our merit.

    Thank you for your attention,
    Sincerely yours,
    Е.К.

    Что это было? - Nota Bene

    Translated

    And:
    ‘Witch hunt & Inquisition’: Kaspersky Lab head responds to US spying accusations
     
    Weebarra, davisd, plat1098 and 4 others like this.
  16. BryanB

    BryanB Level 3

    Aug 17, 2017
    114
    626
    Handyman
    MI
    Windows 7
    Default-Deny
    insanity, Weebarra, davisd and 5 others like this.
  17. BryanB

    BryanB Level 3

    Aug 17, 2017
    114
    626
    Handyman
    MI
    Windows 7
    Default-Deny
    Very compelling post venustus, thank you. Have to have a night to absorb this fully.
     
    venustus, Weebarra, davisd and 2 others like this.
  18. BigWrench

    BigWrench Level 3

    Apr 13, 2014
    143
    409
    Windows 10
    ESET
    mlnevese and Weebarra like this.
  19. Slyguy

    Slyguy Level 21

    Jan 27, 2017
    1,076
    4,331
    Fortinet Engineer
    USA
    Other OS
    I wouldn't run that trash software if they gave me a dozen lifetime licenses for free. Don't worry, Vypre has been working very hard to court US Govt. contracts. They even opened an office in VA just for this purpose. Anyone that was any good at Vypre left it after GFI purchased it. Now it's just a half-baked product using Bit Defender signatures that can't even score close to Bit Defender.

    Funny thing, despite everyone saying Kaspersky is doomed, I still see it sold everywhere. I still see companies installing it. We've still run into firms deploying it. ZyXEL still ships their UTM's with it. So Best Buy doesn't carry it? I wasn't even sure Best Buy was still in business!

    All of this makes me want to run out and buy a bunch of Kaspersky licenses to be honest.. One of my buddies just swapped his entire company over to Kaspersky BECAUSE of this nonsense.. What a rebel, right? :ROFLMAO:
     
    ZeroDay, In2an3_PpG, mlnevese and 4 others like this.
  20. Weebarra

    Weebarra Level 7

    Apr 5, 2017
    341
    8,400
    Somewhere in Scottieland
    Windows 7
    Kaspersky
    Corporate flight from Kaspersky software follows on the heels of the U.S. government’s directive concerning the company’s possible involvement in state-sponsored cyber espionage.

    And the operative word for me in that opening statement from Vipre is underlined in red (by me) ;)
     
Loading...