Advertisement
Advertisement

新足迹

 找回密码
 注册
新足迹 门户 电脑和宽带 查看内容

杀毒软件卡帕斯基的网站被发现传播病毒

2010-10-20 15:39| 发布者: bulaohu | 查看: 1287| 原文链接

卡帕斯基在美国的网站被发现含有病毒。

上个星期天在大概长达三个半小时的时间里,Kaspersky在美国的网站被人攻破,并上传了病毒软件。此病毒会试图传染任何访问了卡帕斯基网站的人。

卡帕斯基一开始不承认这起事件。但周二他们发表声明承认其网站被攻破。

自从2000年以来,卡帕斯基有最少36个内部网站被黑客攻破。2009年初他们的后端的数据库甚至也被攻陷,黑客从中取得了用户、激活码等等数据。



http://www.theregister.co.uk/201 ... website_compromise/

Compromise turns Kaspersky site into malware hub
Alert Print Post comment Retweet Facebook
Hackers exploit buggy app
By Dan Goodin in San Francisco • Get more from this author

Posted in Malware, 19th October 2010 17:44 GMT
Free whitepaper – Controlling the wild web
The US website for anti-virus provider Kaspersky was caught pushing malware to its users for three and a half hours on Sunday after it was compromised by criminal hackers.

The attack first came to light on three separate user forums frequented by Kaspersky users. According to some of the posts, Kaspersky officials initially denied any compromise took place.

“They are stating that I must have went to a phishing site or a site that looks like them,” one user wrote. “Sorry Kaspersky, I typed the correct URL above and was directed directly from your web site. I even went to my order email from Kaspersky I purchase 7-months ago.”

On Tuesday, the Russian anti-virus firm came clean and admitted that hackers were able to compromise the kasperskyusa.com by exploiting a vulnerable third-party application. As a result, people who visited the site were redirected to a malicious webpage.

“The website was simulating a Windows XP Explorer window and a popup window showing scanning process on the local computer and offering the user a fake antivirus program to install,” a statement from Kaspersky stated. “The domain was making these redirections for 3.5 hours in total.”

Based on Kaspersky's terse disclosure, it's likely visitors would become infected only if they fell for the ruse and clicked on links to download and install the malicious software. The statement provides no guidance to users who did so.

The breach is the latest black eye for Kaspersky, as the company tries to make the case it can keep its users safe even as it fails to secure its own online storefront. In early 2009, a 10-day security lapse exposed the back-end database used to run Kaspersky's US-based website. Various Kaspersky international sites have been defaced at least 36 times since 2000, according to The Zero Day security blog.

As was the case with the earlier compromise, Kaspersky said on Tuesday that the attack didn't expose customer data and that the exploit was contained quickly after it was discovered. Company researchers continue to identify possible consequences of the attack and are available to help users remove the malware, though the statement provides no contact details for customers who want to take Kaspersky up on the offer. ®
Advertisement
Advertisement


Advertisement
Advertisement
返回顶部