Kaspersky's US website hacked
The US Kaspersky site admits a vulnerability which hackers used to access its private database.
Kaspersky has suffered from an embarrassing security lapse, with hackers from HackersBlog.org claiming to have infiltrated the US version of its website.
A SQL injection attack was used to break into Kaspersky's database, gaining access to "everything," according to the hackers, who claimed visibility of user accounts, activation codes and customers' personal details.
Kaspersky admitted in a statement that a subsection of the usa.kaspersky.com domain detected a vulnerability at the weekend which a hacker tried to attack. Upon detection, Kaspersky Lab USA took action to roll back the subsection of the site to eliminate the risk.
The Russian company has stressed that the attack didn't affect the UK site in any way. The US website infrastructure is hosted and operated independently, so the breach was confined to the US only.
Both the hackers and Kaspersky stressed that the attack was not malicious, and that no data was exploited due to the flaw. "Kaspersky['s] team doesn't need to worry about us spreading their confidential stuff," the hackers said on their blog in response to a story on The Register.
"Our staff will never save or keep any confidential data. We just point our fingers to the big websites with security problems. We hope to see that vulnerability patched very soon (If it isn't already patched)."
It's alleged that Kaspersky wasn't the only security vendor to be hit by the hackers. They claimed they had also broken into the Portuguese version of BitDefender's company website, accessing personal details and email addresses.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
BitDefender said in reply that the site hacked was not owned or operated by it. It said: "A partner site was compromised and we are working to investigate exactly what happened so we can help our partner prevent this from happening again."
-
Hounslow Council partners with Amazon Web Services (AWS) to build resilience and transition away from legacy techSpomsored One of the most diverse and fastest-growing boroughs in London has completed a massive cloud migration project. Supported by AWS, it was able to work through any challenges
-
Salesforce targets better data, simpler licensing to spur Agentforce adoptionNews The combination of Agentforce 360, Data 360, and Informatica is more context for enterprise AI than ever before
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Critical Dell Storage Manager flaws could let hackers access sensitive data – patch nowNews A trio of flaws in Dell Storage Manager has prompted a customer alert
-
Flaw in Lenovo’s customer service AI chatbot could let hackers run malicious code, breach networksNews Hackers abusing the Lenovo flaw could inject malicious code with just a single prompt
-
Industry welcomes the NCSC’s new Vulnerability Research Initiative – but does it go far enough?News The cybersecurity agency will work with external researchers to uncover potential security holes in hardware and software
-
Hackers are targeting Ivanti VPN users again – here’s what you need to knowNews Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
-
Broadcom issues urgent alert over three VMware zero-daysNews The firm says it has information to suggest all three are being exploited in the wild
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claimNews Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.