新足迹

 找回密码
 注册

精华好帖回顾

· 移民等待日记 (2006-12-26) leily · 三十九岁的最后一天,阳光似乎也被带走 -- 888玉女偶像伊能静 (2008-11-16) steveking
· 蝴蝶兰问诊贴【更新】 (2018-9-2) 欢喜心 · 菲利普岛 及 其他 (2022-9-16) 胡须康
Advertisement
Advertisement
查看: 1169|回复: 5

杀毒软件卡帕斯基的网站被发现传播病毒 [复制链接]

发表于 2010-10-20 14:39 |显示全部楼层
此文章由 bulaohu 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 bulaohu 所有!转贴必须注明作者、出处和本声明,并保持内容完整
卡帕斯基在美国的网站被发现含有病毒。

上个星期天在大概长达三个半小时的时间里,Kaspersky在美国的网站被人攻破,并上传了病毒软件。此病毒会试图传染任何访问了卡帕斯基网站的人。

卡帕斯基一开始不承认这起事件。但周二他们发表声明承认其网站被攻破。

自从2000年以来,卡帕斯基有最少36个内部网站被黑客攻破。2009年初他们的后端的数据库甚至也被攻陷,黑客从中取得了用户、激活码等等数据。



http://www.theregister.co.uk/201 ... website_compromise/

Compromise turns Kaspersky site into malware hub
Alert Print Post comment Retweet Facebook
Hackers exploit buggy app
By Dan Goodin in San Francisco • Get more from this author

Posted in Malware, 19th October 2010 17:44 GMT
Free whitepaper – Controlling the wild web
The US website for anti-virus provider Kaspersky was caught pushing malware to its users for three and a half hours on Sunday after it was compromised by criminal hackers.

The attack first came to light on three separate user forums frequented by Kaspersky users. According to some of the posts, Kaspersky officials initially denied any compromise took place.

“They are stating that I must have went to a phishing site or a site that looks like them,” one user wrote. “Sorry Kaspersky, I typed the correct URL above and was directed directly from your web site. I even went to my order email from Kaspersky I purchase 7-months ago.”

On Tuesday, the Russian anti-virus firm came clean and admitted that hackers were able to compromise the kasperskyusa.com by exploiting a vulnerable third-party application. As a result, people who visited the site were redirected to a malicious webpage.

“The website was simulating a Windows XP Explorer window and a popup window showing scanning process on the local computer and offering the user a fake antivirus program to install,” a statement from Kaspersky stated. “The domain was making these redirections for 3.5 hours in total.”

Based on Kaspersky's terse disclosure, it's likely visitors would become infected only if they fell for the ruse and clicked on links to download and install the malicious software. The statement provides no guidance to users who did so.

The breach is the latest black eye for Kaspersky, as the company tries to make the case it can keep its users safe even as it fails to secure its own online storefront. In early 2009, a 10-day security lapse exposed the back-end database used to run Kaspersky's US-based website. Various Kaspersky international sites have been defaced at least 36 times since 2000, according to The Zero Day security blog.

As was the case with the earlier compromise, Kaspersky said on Tuesday that the attack didn't expose customer data and that the exploit was contained quickly after it was discovered. Company researchers continue to identify possible consequences of the attack and are available to help users remove the malware, though the statement provides no contact details for customers who want to take Kaspersky up on the offer. ®
Advertisement
Advertisement

发表于 2010-10-20 14:49 |显示全部楼层
此文章由 jerryclark 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 jerryclark 所有!转贴必须注明作者、出处和本声明,并保持内容完整
乌龙大了

2007 年度奖章获得者

发表于 2010-10-20 14:53 |显示全部楼层
此文章由 coolioo 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 coolioo 所有!转贴必须注明作者、出处和本声明,并保持内容完整
hoho, how embarrassing...

发表于 2010-10-20 14:56 |显示全部楼层
此文章由 金牌打手 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 金牌打手 所有!转贴必须注明作者、出处和本声明,并保持内容完整
大家来竞猜是哪个竞争对手雇人干的?

有人猜瑞星不?

发表于 2010-10-20 14:57 |显示全部楼层

回复 4# 的帖子

此文章由 zurich 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 zurich 所有!转贴必须注明作者、出处和本声明,并保持内容完整
360?

发表于 2010-10-20 15:20 |显示全部楼层
此文章由 bulaohu 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 bulaohu 所有!转贴必须注明作者、出处和本声明,并保持内容完整
瑞星恐怕没这个本事
Advertisement
Advertisement

发表回复

您需要登录后才可以回帖 登录 | 注册

本版积分规则

Advertisement
Advertisement
返回顶部