Kaspersky Customer Database Hacked :-O

Discussion in 'other security issues & news' started by hawki, Feb 8, 2009.

Thread Status:
Not open for further replies.
  1. Iam_me

    Iam_me Registered Member

    Joined:
    Feb 6, 2009
    Posts:
    89
    Its not to big of a deal..
    Nasa gets hacked, CIA, everyone and now kasp..

    Lets just hope they learn from this! :-* :-*
    I bet it won't happen again in a very long time..
     
  2. thathagat

    thathagat Guest

    sadly...the price is mainly paid by the site owners.....fending the brickbats...swallowing the embarssment....restoring the credibilty....all due to some fame/adventure seeking cyber junkies.......:thumbd:
     
  3. gery

    gery Registered Member

    Joined:
    Mar 8, 2008
    Posts:
    2,175
    so the party is getting very hot in here . come on guys there is no big deal. if Cia or FBI gets hacked what the hack are you talking about. just give these guys a break :D :D :D :D :D
     
  4. shah000

    shah000 Registered Member

    Joined:
    Oct 16, 2008
    Posts:
    3
    * Press Release from Kaspersky Labs

    http://www.kaspersky.com/in/news?id=207575747

     
  5. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,078
    Location:
    DC Metro Area
    FWIW: from IT Wire Re: Kaspersky Press Release


    "It’s a typical media statement and it’s what you would expect a company to say. It gives a reassuring message that, while acknowledging an exploit was possible, nothing happened. An attack attempt failed, Kaspersky reacted super-fast, and no data was laid bare.

    The problem is, it’s all a load of crock.

    First, the hacker who reported the vulnerability – unu – did more than just “attempt” anything. The screenshots given show a successful breach of the Kaspersky web site.

    Further, unu lists all the database tables used by the site. It is a bald-faced lie to say no data was compromised. Perhaps a more accurate wording would be that nobody who accessed the site chose to publicise the data they saw. That’s quite different to “no data was compromised.”

    In fact, Kaspersky are being duplicitous when they say the site was only vulnerable for a brief time, and moreso when they say the vulnerability was eliminated within a rapid time frame.

    Firstly, the vulnerability has existed – whether known or not – since the time the version of the website compromised by unu had been put into production.

    Secondly, according to an administrator at the hackerblog web site that unu used to publish the vulnerability, unu had only gone public after many failed attempts to get Kaspersky to take the matter seriously.

    It transpires unu sent e-mails to info@kaspersky.comThis e-mail address is being protected from spam bots, you need JavaScript enabled to view it , forum@kaspersky.comThis e-mail address is being protected from spam bots, you need JavaScript enabled to view it and webmaster@kaspersky.comThis e-mail address is being protected from spam bots, you need JavaScript enabled to view it days earlier. Nobody from Kaspersky responded and nobody patched the site.

    Finally, unu posted a description of the problem with accompanying screenshots and only then did Kaspersky react. Even then, it wasn’t swift. According to The Register other people were able to reproduce unu’s exploit based on the information presented in the blog posting, announcing that it was active the entire day following unu’s announcement."

    http://www.itwire.com/content/view/23118/1231/
     
  6. format_c

    format_c Registered Member

    Joined:
    May 6, 2008
    Posts:
    116
    you're wrong completly, that did happen 3d time now.
     
  7. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,078
    Location:
    DC Metro Area
    From Kaspersky Press Conference of this PM:

    According to the company, the problem was due to the site not properly validating user input. Roel Schouwenberg, senior anti-virus researcher at Kaspersky, confirmed that the names of the tables are accurate. However, having the names of the tables does not mean the hacker actually accessed to them, he noted.

    He added that no credit card data was stored on the server targeted by the hacker, though there were about product activation codes as well as 2,500 e-mail addresses for people who signed up for a product trial.

    “This shouldn’t have happened,” he said, adding he was worried about the impact the hack would have on Kaspersky’s reputation.

    The vulnerable code the hacker took advantage of to launch the attack was developed externally and did not go through Kaspersky’s normal code review process, Schouwenberg conceded.

    To further reassure customers that no data was actually exposed, the company has hired well-known database security expert David Litchfield of NGS Software to perform an independent investigation of the incident.

    http://www.eweek.com/c/a/Security/Kaspersky-Lab-Pours-Cold-Water-on-Claims-of-Data-Breach-By-Hacker/
     
  8. oliverjia

    oliverjia Registered Member

    Joined:
    Jul 21, 2005
    Posts:
    1,926
    I have to disagree. Surely the virus writers and hackers are not a good group of people but where do you think the reputation of Kaspersky come from? By fighting these bad guys! It's a war between virus and antivirus authors. Like in a real war, bitching about how bad your enemies just showed how weak you are. So here I don't think its a good reasoning to blame the so called cyber junkies. You have to face the reality.

     
  9. virtumonde

    virtumonde Registered Member

    Joined:
    Jan 18, 2008
    Posts:
    504
    Well they've admited it,that's good .
    Of course i don't belive them regarding the credit card data.Time will tell.
     
  10. steve1955

    steve1955 Registered Member

    Joined:
    Feb 7, 2004
    Posts:
    1,384
    Location:
    Sunny(in my dreams)Manchester,England
    I thought Kaspersky purchases were made through a 3rd party,element 5 or other companies that offer the same service to vendors and as such no or very few credit card details would have been held by Kaspersky??
     
  11. Baz_kasp

    Baz_kasp Registered Member

    Joined:
    May 1, 2008
    Posts:
    593
    Location:
    London

    You don't believe them but the fact is all purchasing/cc data is handled on a completely different server/system by their payment processor, which depening on where you are is arvato or element 5. The credit card data would not be stored in the database that was subject to attack.
     
  12. EsoxLucius

    EsoxLucius Registered Member

    Joined:
    Oct 27, 2006
    Posts:
    125
    Location:
    Bucharest, Romania
    BitDefender website from Portugal is OK, it was a reseller website not a BitDefender website, that means another database and CMS is used. Also there is an ongoing audit on the partner site to give them a heads-up in case there are other exploitable sites.

    There are so many comments about these issues, but I don't really see the problem. I see everybody is trying to link a website and the security on that with the quality of the software and it doesn't makes sense.
     
  13. steve1955

    steve1955 Registered Member

    Joined:
    Feb 7, 2004
    Posts:
    1,384
    Location:
    Sunny(in my dreams)Manchester,England
  14. s4u

    s4u Registered Member

    Joined:
    Oct 24, 2007
    Posts:
    441
  15. Oldjim

    Oldjim Registered Member

    Joined:
    Sep 7, 2005
    Posts:
    99
    From here Kaspersky Forum
     
  16. plantextract

    plantextract Registered Member

    Joined:
    Feb 13, 2007
    Posts:
    392
  17. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,078
    Location:
    DC Metro Area
  18. TonyW

    TonyW Registered Member

    Joined:
    Oct 12, 2005
    Posts:
    2,741
    Location:
    UK
    KL has released a further statement on this incident, including comments from David Litchfield: http://www.kaspersky.com/news?id=207575753
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.