
Cyberwarfare Concerns Yield Consequences for Russian Tech Companies
Suspected involvement in destabilization efforts, including the devastating NotPetya attack that rocked healthcare, brought sanctions and killed partnerships this week.
Twice this week, Western governments have taken punitive action against Russian companies and individuals out of suspicion that they contributed to ongoing cyberwarfare operations, including the now-notorious NotPetya attack that caused massive headaches for healthcare last summer.
On June 11th, the United States Department of the Treasury slapped a fresh batch of economic sanctions on
>>>READ:
The FSB was blamed for launching NotPetya as a fake ransomware attack directed against Ukrainian infrastructure. Despite apparent efforts to target its spread, the cyberweapon ended up infecting enormous international companies, causing service delays and wiping out billions in revenue. American healthcare entities like Merck and Nuance Communications, both of which have operations or partnerships in Ukraine, fell victim to the attack
For that and other “destabilizing cyber activities”—including cyber intrusions against the US power grid—US citizens are now forbidden from doing business with firms Digital Security, ERPScan, Embedi, Kvant Scientific Research Institute, and Divetechnoservices. Three Divetechnoservices executives also made the list, and US-based assets belonging to the sanctioned parties are now blocked.
That news was followed a day later by the
In the wake of the European Parliament’s declaration, Kaspersky suspended activities with the EU and its participation in the campaign.
“We have protected the EU for 20 years working with law enforcement leading to multiple arrests of CYBERCRIMINALS,” founder Eugene Kaspersky
In December 2017, the US
Speaking to Healthcare Analytics News™, cybersecurity experts described the NotPetya attack as intelligently designed and “elegant.” In addition to mechanisms meant to restrain its spread to Ukraine, it also acted differently when it encountered machines running Kaspersky’s software.
It remains unclear, according to some experts, why that was the case. In its own analysis of the attack, published a day after it first hit, Kaspersky told infected users “
The company was given the opportunity to respond to the US ban, and it has committed to making its software code open source to disprove allegations of involvement with Russian government activities. It claims to cover over
Related Coverage:








































