newsletter banner

ISSUE 21.42.F • 2024-10-14 • Text Alerts!Gift Certificates
You’re reading the FREE newsletter

Plus Membership

You’ll immediately gain access to the longer, better version of the newsletter when you make a donation and become a Plus Member. You’ll receive all the articles shown in the table of contents below, plus access to all our premium content for the next 12 months. And you’ll have access to our complete newsletter archive!

Upgrade to Plus membership today and enjoy all the Plus benefits!

In this issue

PUBLIC DEFENDER: The US has banned Kaspersky software — should you worry?

Additional articles in the PLUS issue

MICROSOFT 365: Is Office 2024 worth getting excited about?

INTEL: Core Ultra Series 2 desktop processors

PATCH WATCH: Are you ready for Windows 11 24H2?


ADVERTISEMENT
VideoProc Converter AI

VideoProc Converter AI Anniversary Offer – Save 66% and Win Gifts

Enhance your video/image quality faster with VideoProc Converter AI. It uses four AI models to upscale old photos, low-resolution footage, DVDs, anime, AIGC, and more, intelligently de-noising, fixing blurriness, and enhancing details like skin, hair, fur, and textures. Choose between two upscaling modes: “Fast” and “High Quality.” Plus, it’s a versatile solution for converting, compressing, downloading, editing, and recording videos.

Take advantage of the 66% anniversary discount and exciting gifts!! The best budget-friendly AI video and image enhancer is now at its lowest price!


PUBLIC DEFENDER

The US has banned Kaspersky software — should you worry?

Brian Livingston

By Brian Livingston Comment about this article

The popular Kaspersky antivirus program quietly disabled itself on computers in the US last month, making millions of users fear malware had struck them.

The switcheroo was prompted by the US government banning Kaspersky Lab, a Russia-based company, from sending updates to American devices after September 29, 2024. Kaspersky had sent out an email — which many users didn’t read or felt was unclear — before its app shut down on September 19. Kaspersky then remotely installed on US computers a little-known antivirus alternative called UltraAV.

The US ban on security updates came after years of deeply embarrassing leaks of top-secret documents from the National Security Agency (NSA) and other intelligence services:

  • Edward Snowden, an independent contractor to the NSA as an employee of the Booz Allen Hamilton consulting firm, revealed in 2013 thousands of classified documents describing US surveillance programs involving secret collaborations with global telecom companies.
  • An unnamed contractor copied numerous top-secret details of NSA espionage techniques to his home computer, where the documents were remotely accessed in 2015 by state-sponsored hackers in Russia, as first reported in a 2017 Wall Street Journal article.
  • Harold Martin III, another Booz Allen employee, was arrested in 2016 for copying 50,000GB of intelligence-agency documents, which he kept unencrypted in his home and in a car parked on the street, according to a US Department of Justice announcement.

Kaspersky Lab promotional image
Figure 1. In this promotional image, Kaspersky states that it delivers 60,000 antivirus-signature updates per month to 400 million individual users in some 200 countries.Source: Kaspersky Lab

Kaspersky antivirus software may have been exploited by hackers

Troubles began for Kaspersky after NSA researchers concluded that a vulnerability in the AV app had allowed Russian government coders to access the files of the unnamed contractor in 2015.

“The hackers appear to have targeted the contractor after identifying the files through the contractor’s use of a popular antivirus software made by Russia-based Kaspersky Lab,” WSJ wrote in its 2017 article.

I asked Kaspersky Lab for an official response to these allegations. A spokesperson in the company’s London office, where the corporation is domiciled, replied to my questions as follows:

Has anyone shown any “back door” in Kaspersky software that could have allowed hackers to access a US defense contractor’s home computer?

No. Kaspersky does not include any undeclared capabilities in its products, because such activity would be illegal. We have never received any such requests and will not address them, should they emerge in the future. Where applicable, Kaspersky is ready to present the source code of its products for review. In addition, Kaspersky has been running a Bug Bounty Program, offering security researchers an opportunity to search for security bugs in our products in exchange for a bounty. Alongside everything mentioned above, the process of obtaining licenses for the development of software for information security involves our products being examined by regulators for undeclared features (backdoors).

Does Kaspersky Lab deny that there was such a vulnerability — one that would have allowed a hacker to remotely access a user’s home computer?

As mentioned above, Kaspersky does not include any undeclared capabilities in its products. We regularly receive the ISO/IEC 27001:2013 certification, showing our commitment to strong data security, and that Kaspersky’s Data Service is in full compliance with industry leading practices. We regularly pass the SOC 2 audit to confirm that Kaspersky’s AV bases are protected from unauthorized changes by strong security controls.

If an AV program had a back door, how would you know?

The absence of known Kaspersky vulnerabilities may be true today. But a Russian exploitation of the company’s network servers was confirmed a few years ago by independent sources:

  • Israel’s national security agency hacked into Kaspersky’s corporate systems in 2014, according to a 2017 New York Times exclusive.
  • “Israeli intelligence officers looked on in real time as Russian government hackers searched computers around the world for the code names of American intelligence programs,” the Times journalists explained.
  • The Russian agents gleaned secrets from multiple sources, the Times said, “by turning the Kaspersky software into a sort of Google search for sensitive information.”
  • “The Israeli officials who had hacked into Kaspersky’s own network alerted the United States to the broad Russian intrusion, which has not been previously reported,” the Times wrote.

Kaspersky Lab didn’t detect Israel’s eavesdropping on its server until mid-2015. Far from denying the Russian intrusion, Kaspersky issued a seven-page public report (PDF) acknowledging it. The company attributed the exploitation of its systems to a variation of the so-called Duqu virus. “We believe this is a nation-state sponsored campaign,” Kaspersky Lab’s report said.

Bad actors’ malicious use of an AV program’s update mechanism to remotely execute hacker code is a potential danger for every security company.

“Antivirus is the ultimate back door,” the Times quoted Blake Darché of Area 1 Security as saying. “It provides consistent, reliable and remote access that can be used for any purpose, from launching a destructive attack to conducting espionage on thousands or even millions of users.”

Governments around the world crack down on Kaspersky software

In the US, restrictions on Kaspersky apps began with baby steps, rising gradually to a total ban:

  • The US Department of Homeland Security issued a binding directive in September 2017 ordering federal agencies to find and uninstall any Kaspersky Lab products. At one point, Kaspersky’s AV had been installed by at least two dozen US government agencies.
  • The Commerce Department’s Bureau of Industry and Security announced on June 20, 2024, a ban that the agency called “the first of its kind.” The order barred Kaspersky Lab from selling its software to anyone in the US after July 20, 2024.
  • In the same edict, the bureau prohibited Kaspersky Lab from distributing its codebase updates or antivirus signatures to any US customer as of September 29, 2024.

The Commerce Department justified its complete ban on Kaspersky updates by stating, in part: “Kaspersky is subject to the jurisdiction, control, or direction of the Russian government, a foreign adversary.”

Whether the Kremlin would ever order Kaspersky executives in Moscow to insert remote-execution code into its AV updates — or has already done so — is a subject of hot debate within security circles.

What we know for sure is that numerous Western countries, in addition to the US, have restricted the Russian company’s software in the past few years. The European Union issued a report in 2018 that said Kaspersky Lab was “confirmed as malicious.” For details, see a Wikipedia article: Kaspersky and the Russian government.

How not to change software on millions of people’s computers

An antivirus program without daily updates of new malware signatures would be worse than useless. Instead of simply halting the company’s updates, therefore, Kaspersky chose to disable its AV software and install an alternative app that wasn’t being banned.

Kaspersky notices of UltraAV

Unfortunately, the company put out the most conflicting and confusing notifications to users that you can imagine.

In early September 2024, Kaspersky Lab sent to US users an email similar to the message shown at left. (Larger image at Reddit user Chrisboy265’s post.)

Although many Kaspersky users have commented that they never saw such an email, it would certainly have clouded the waters for them if they had.

The email reads, in part: “In the coming days, you will be receiving communications from UltraAV with instructions on how to activate your new account. We’re confident that you’ll enjoy the enhanced protection and features UltraAV offers.”

The message was wrong. Users received no instructions from UltraAV about activation. Instead, as numerous former Kaspersky customers have reported, their installed antivirus program simply stopped working one night and UltraAV was running in its place. No activation was required. (Also, if Kaspersky’s own VPN had previously been installed, UltraVPN was now operating in its place.)

Some Kaspersky subscribers saw an in-app notification like the one at lower left. “In order to deliver continued protection, your Kaspersky service will soon be moving to UltraAV,” it said. “Upon transition, UltraAV protection will be automatically activated on your device. No action is required.”

The “no action” part, at least, turned out to be correct. But, for heaven’s sake, neither the email nor the in-app notice said anything about the date and time when the transition would take place! That’s why even people who had paid attention to the messages were shocked — and suspected that their computer had been infected by a virus — when the Kaspersky antivirus program suddenly no longer worked and an obscure, practically unknown app was taking its place.

To add insult to injury, there was also no information in these notifications about possible alternatives to UltraAV. What if a subscriber wanted to switch to a completely different antivirus program — perhaps one that had been extensively tested by independent third parties and was highly rated by respected reviewers?

Kaspersky Lab seemed to be saying to its millions of users in the US, “You’re on your own.”

The complaints flowing from angry customers are perhaps best read, ironically, at Kaspersky’s own support forum. Start with the comments on Page 2 of the forum’s UltraAV topic. You can easily navigate to earlier and later posts, if that page isn’t enough to give you the general idea.

UltraAV isn’t malware, but it isn’t great

By all accounts, UltraAV is a legitimate antivirus program and not a hack attack. But it’s easy to understand why many users immediately came to the conclusion that UltraAV was some kind of malware:

  • You can’t simply uninstall it. Numerous users have reported that Windows’ standard uninstall methods don’t work on UltraAV. After a reboot, the program automatically reinstalls itself. (See below for a workaround.)
  • Standard testing organizations have never evaluated UltraAV. Well-known antivirus test labs, such as AMTSO (the Anti-Malware Testing Standards Organization), AV-Comparatives, AV-TEST, and Virus Bulletin have nothing about the app. That’s probably because UltraAV is very new, as I describe below.
  • It’s an offshoot of a primarily VPN company. Kaspersky Lab has made it clear that UltraAV is an antivirus program from a company called Pango. The holding company of this firm, founded in 2005, owns or operates numerous virtual private network programs, including VPN360, OVPN, Betternet, Hotspot Shield, and UltraVPN. It also owns Comparitech, a website that reviews VPN and antivirus programs (but not UltraAV, strangely).
  • UltraAV is a spinoff from a security suite. Pango was purchased in 2020 by a cybersecurity company named Aura, according to a Mergr summary. Aura’s identity-protection suite included an antivirus program rumored to be the AV component of Avira Free Security. Pango and Aura divided into two separate companies again, just one week before Kaspersky Lab announced its conversion to UltraAV, which is apparently Aura’s old code. As an add-on within a package within a suite, it’s not surprising that UltraAV never rose to the attention of AMTSO and other standards organizations.
Uninstall Kaspersky and UltraAV, and get good software

With all the suspicion around Kaspersky Lab’s Kremlin connections, its precarious business model will only get worse over time, not better. If you formerly used Kaspersky AV, my recommendation is that you choose a different, highly rated antivirus program. But before installing a new AV, you must uninstall Kaspersky’s software — its files are still on your machine, even if they’re currently dormant — and uninstall UltraAV.

The following reviews rate the best antivirus programs, including both paid and free offerings:

Once you’ve selected a new security program, take the following steps to switch to it:

  • Uninstall Kaspersky software. The usual Windows uninstall procedures (Settings | Apps and so forth) seem to work fine on Kaspersky’s products.
  • Uninstall UltraAV, using its official method. Differing instructions — one procedure for Win10 and another for Win11 — are given on the app’s Uninstall Ultra Antivirus webpage.
  • If the official method doesn’t work, use an independent uninstaller. Visit Hackerdose’s Uninstall UltraAV and UltraVPN page. The article first explains Windows’ own uninstall tools, then describes how to use the free version of Revo Uninstaller if your other efforts failed.
  • Reboot your computer. This is a necessary, final step that makes the above changes permanent.
  • Microsoft Defender, built into Windows, will usually provide antivirus protection automatically, in the absence of UltraAV. Confirm that Defender is in control by opening Settings, searching for “Virus” and clicking on Virus & threat protection, and then clicking on Manage providers under Who’s protecting me? Microsoft Defender should be shown under Antivirus. If not, go back a page and click on Manage settings under Virus & threat protection settings and toggle Real-time protection to on. If that doesn’t work, follow the troubleshooting steps described in a Perplexity article.
  • If you’d like to simply stick with Defender, you’re done. Otherwise, take the following last step.
  • Download your chosen AV program and install it. It will automatically take over from Microsoft Defender and become your new security protector.

Whew! Something so basic as protecting your computer from viruses can get so complicated.

Stay safe out there! And watch for my October 21, 2024, column on using Microsoft Defender as your primary antivirus app.

Talk Bubbles post comment button Contribute your thoughts
in this article’s forum!
send tip button Do you know something we all should know?
Send your story to Brian in confidence!

The PUBLIC DEFENDER column is Brian Livingston’s campaign to give you consumer protection from tech. If it’s irritating you, and it has an “on” switch, he’ll take the case! Brian is a successful dot-com entrepreneur, author or co-author of 11 Windows Secrets books, and author of the fintech book Muscular Portfolios.


ADVERTISEMENT
Tech Brew

Tech Brew

Join the over 400K people reading Tech Brew – the free 3x/week email delivering the latest updates on the technology changing the business world. Check it and start getting smarter today!

Try it!


Here are the other stories in this week’s Plus Newsletter

MICROSOFT 365

Peter Deegan

Is Office 2024 worth getting excited about?

By Peter Deegan

The new single-purchase, non-subscription version of Microsoft Office, released just a few weeks ago, is a replacement for Office 2021 and Office 2019.

Those with a Microsoft 365 plan need not think about Office 2024, because the latter has a smaller set of features than the subscription version of Office.

In this column, I’ll discuss what’s in Office 2024 and what it doesn’t include — and some features that Microsoft is uncharacteristically quiet about. I’ll also mention where to buy it for less.

INTEL

Will Fastie

Core Ultra Series 2 desktop processors

By Will Fastie

Once again, new naming conventions make understanding Intel’s processors confusing.

Late last week, Intel announced a series of new Core Ultra processors for desktop computers. These are designated “S” models. A month ago, Intel announced Core Ultra processors for laptops, designated “V.”

At least for the moment, this is all very confusing. My big takeaway is that the V models are optimized for AI in the most popular form factor, laptops. The S models are optimized for the desktop gaming market. These initial S models do not perform as well for AI.

PATCH WATCH

Susan Bradley

Are you ready for Windows 11 24H2?

By Susan Bradley

If you are like many others, the answer is no. And for good reasons.

24H2 is a big, disruptive update — a complete operating system swap. That’s both good and bad. For the good, if a PC is throwing off any Windows Update errors, allowing 24H2 to install should clear those up by fixing any corrupted files.

But for the bad — aside from the disruption — installing 24H2 is a long process, taking at least 30 to 60 minutes, perhaps longer. It’s not quick, like running the 23H2 enablement package.


Know anyone who would benefit from this information? Please share!
Forward the email and encourage them to sign up via the online form — our public newsletter is free!


Enjoying the newsletter?

Become a PLUS member and get it all!

Plus membership

Don’t miss any of our great content about Windows, Microsoft, Office, 365, PCs, hardware, software, privacy, security, safety, useful and safe freeware, important news, analysis, and Susan Bradley’s popular and sought-after patch advice.

PLUS, these exclusive benefits:

  • Every article, delivered to your inbox
  • Four bonus issues per year, with original content
  • MS-DEFCON Alerts, delivered to your inbox
  • MS-DEFCON Alerts available via TEXT message
  • Special Plus Alerts, delivered to your inbox
  • Access to the complete archive of nearly two decades of newsletters
  • Identification as a Plus member in our popular forums
  • No ads

We’re supported by donations — choose any amount of $6 or more for a one-year membership.

Join Today buttonGift Certificate button

The AskWoody Newsletters are published by AskWoody Tech LLC, Fresno, CA USA.

Your subscription:

Microsoft and Windows are registered trademarks of Microsoft Corporation. AskWoody, AskWoody.com, Windows Secrets Newsletter, WindowsSecrets.com, WinFind, Windows Gizmos, Security Baseline, Perimeter Scan, Wacky Web Week, the Windows Secrets Logo Design (W, S or road, and Star), and the slogan Everything Microsoft Forgot to Mention all are trademarks and service marks of AskWoody Tech LLC. All other marks are the trademarks or service marks of their respective owners.

Copyright ©2024 AskWoody Tech LLC. All rights reserved.