backtop


Print 25 comment(s) - last by teohhanhui.. on Feb 11 at 1:29 PM


SQL injection  (Source: HackersBlog)
Although there are a lot of high-profile hacker intrusions these days, it normally doesn't happen to security companies... but it recently did to Kaspersky

Security firm Kaspersky Security has been left embarrassed after a hacker informed them that a customer information database was left exposed for 11 days before the security firm was able to secure it.

"Honestly, this is not good for any company and especially not good for a company dealing with security," Kaspersky senior antivirus researcher Roel Schouwenberg said during a media phone conference.  "This should not have happened.  We are now doing everything within our power to do the forensics on the case, and to prevent this from happening again."

Although no customer information was reportedly accessed by the intruder, the millions of customers who have used Kaspersky may think twice before doing so again.  In total, 2,500 users' e-mail addresses and around 25,000 product activation codes were at risk over the 11-day period.

A posting on the Hackersblog.org web site includes screenshots of the hacker who used an SQL injection to access the company's database.  It looks like a part of Kaspersky's U.S. support site was breached using the SQL injection attack -- the site was created an unnamed third party and was not reviewed properly by the security company prior to being used on the site.

"Alter one of the parameters and you have access to EVERYTHING: users, activation codes, lists of bugs, admins, shop, etc.," the blog entry on Hackersblog.org indicates.

The U.S. support site officially went live on January 28 and was first marketed to the public on January 29, according to Kaspersky.  It doesn't look like the site was infiltrated by any other hackers since the site has been published.

Kaspersky has called upon Next Generation Security Software's David Litchfield, a security expert specializing in SQL injection attacks, to conduct an independent audit and security risk analysis of the company's web site.  Once finished, the report will be published on Kaspersky's web site for all visitors to see.



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

Kaspersky site...Hack
By Jayw on 2/10/2009 3:22:17 PM , Rating: 2
Igor Kurzin
View Member Profile Yesterday, 13:59 Post #8

Security Expert

Group: Admin
Posts: 763
Joined: 4.04.2005
From: KL HQ

On Saturday, February 7, 2009, a vulnerability was detected on
usa.kaspersky.com website when a hacker made an attempt to attack. After
disclosing the vulnerability the site was vulnerable for a brief period,
and upon detection of the vulnerability, we immediately took action to
roll back the subsection of the site. The problem was eliminated within
30 minutes of detection. Fortunatly, no sensitive data was stolen from the site.

We expect a press-release today concerning this issue.

This is right from Kaspersky forums...

All you guys are both right...concerning running AV or not to run AV...If you really want to be safe IMO...just unplug that Ethernet cable :)




"A lot of people pay zero for the cellphone ... That's what it's worth." -- Apple Chief Operating Officer Timothy Cook











botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki