Kaspersky's US website hacked
The US Kaspersky site admits a vulnerability which hackers used to access its private database.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Kaspersky has suffered from an embarrassing security lapse, with hackers from HackersBlog.org claiming to have infiltrated the US version of its website.
A SQL injection attack was used to break into Kaspersky's database, gaining access to "everything," according to the hackers, who claimed visibility of user accounts, activation codes and customers' personal details.
Kaspersky admitted in a statement that a subsection of the usa.kaspersky.com domain detected a vulnerability at the weekend which a hacker tried to attack. Upon detection, Kaspersky Lab USA took action to roll back the subsection of the site to eliminate the risk.
The Russian company has stressed that the attack didn't affect the UK site in any way. The US website infrastructure is hosted and operated independently, so the breach was confined to the US only.
Both the hackers and Kaspersky stressed that the attack was not malicious, and that no data was exploited due to the flaw. "Kaspersky['s] team doesn't need to worry about us spreading their confidential stuff," the hackers said on their blog in response to a story on The Register.
"Our staff will never save or keep any confidential data. We just point our fingers to the big websites with security problems. We hope to see that vulnerability patched very soon (If it isn't already patched)."
It's alleged that Kaspersky wasn't the only security vendor to be hit by the hackers. They claimed they had also broken into the Portuguese version of BitDefender's company website, accessing personal details and email addresses.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
BitDefender said in reply that the site hacked was not owned or operated by it. It said: "A partner site was compromised and we are working to investigate exactly what happened so we can help our partner prevent this from happening again."
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches

