Kaspersky's US website hacked
The US Kaspersky site admits a vulnerability which hackers used to access its private database.
Kaspersky has suffered from an embarrassing security lapse, with hackers from HackersBlog.org claiming to have infiltrated the US version of its website.
A SQL injection attack was used to break into Kaspersky's database, gaining access to "everything," according to the hackers, who claimed visibility of user accounts, activation codes and customers' personal details.
Kaspersky admitted in a statement that a subsection of the usa.kaspersky.com domain detected a vulnerability at the weekend which a hacker tried to attack. Upon detection, Kaspersky Lab USA took action to roll back the subsection of the site to eliminate the risk.
The Russian company has stressed that the attack didn't affect the UK site in any way. The US website infrastructure is hosted and operated independently, so the breach was confined to the US only.
Both the hackers and Kaspersky stressed that the attack was not malicious, and that no data was exploited due to the flaw. "Kaspersky['s] team doesn't need to worry about us spreading their confidential stuff," the hackers said on their blog in response to a story on The Register.
"Our staff will never save or keep any confidential data. We just point our fingers to the big websites with security problems. We hope to see that vulnerability patched very soon (If it isn't already patched)."
It's alleged that Kaspersky wasn't the only security vendor to be hit by the hackers. They claimed they had also broken into the Portuguese version of BitDefender's company website, accessing personal details and email addresses.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
BitDefender said in reply that the site hacked was not owned or operated by it. It said: "A partner site was compromised and we are working to investigate exactly what happened so we can help our partner prevent this from happening again."
-
Anthropic targets vulnerability detection gains with Claude Security public beta — here's what users can expectNews The Claude Mythos developer is aiming for a more limited approach to cyber tooling for public consumption
-
Researchers warn millions of RDP and VNC servers are wide open to exploitationNews Researchers at Forescout spotted millions of RDP and VNC servers exposed online
-
Brace yourselves for a vulnerability explosion, Forescout warnsNews AI advances are helping identify software flaws at record pace and scale, but that's not the good news some would think
-
Ubuntu vulnerability exposes enterprises to root escalation, complete system compromiseNews The high-severity Ubuntu vulnerability allows an unprivileged local attacker to escalate privileges through the interaction of two standard system components
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers

