Kaspersky website suffers SQL vulnerability

Posted by   Virus Bulletin on   Feb 10, 2009

Hackers gain access to tables, no user data stolen.

A security flaw in a local website of security firm Kaspersky Lab was spotted by hackers over the weekend, with an SQL infection attack potentially leading to exposure of customer details. No details were in fact extracted from the vulnerable databases, and the flaw was quickly corrected, according to Kaspersky.

The flaw affected the support area of the security firm's US website. Hackers posted details of their coup online after giving Kaspersky a brief warning of the issue, but some confusion over the severity of the flaw was apparent in initial reports. The hackers claimed to have acted ethically, merely proving the viability of exploitation before passing on details, and it was also suggested that the vulnerability remained unfixed for several days. However, later reports from Kaspersky imply that attempts to gather sensitive data were made, and failed, prior to notification being sent, and that the hole was blocked within hours.

The initial disclosure of the flaw is here, with rebuttal and clarification from Kaspersky analysts involved in the cleanup here, and a string of reports in The Register here, here and here.

Posted on 10 February 2009 by Virus Bulletin

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Necurs pump-and-dump spam campaign pushes obscure cryptocurrency

A Necurs pump-and-dump spam campaign pushing the lesser known Swisscoin botnet is mostly background noise for the Internet.

Alleged author of creepy FruitFly macOS malware arrested

A 28-year old man from Ohio has been arrested on suspicion of having created the mysterious FruitFly malware that targeted macOS and used it to spy on its victims.

The threat and security product landscape in 2017

At the start of the new year, Virus Bulletin looks back at the threats seen in the 2017 and at the security products that are available to help mitigate them.

Spamhaus report shows many botnet controllers look a lot like legitimate servers

Spamhaus's annual report on botnet activity shows that botherders tend to use popular, legitimate hosting providers, domain registrars and top-level domains when setting up command-and-control servers.

Tips on researching tech support scams

As tech support scammers continue to target the computer illiterate through cold calling, VB's Martijn Grooten uses his own experience to share some advice on how to investigate such scams.