Hard to digest, but true. The leading anti-virus website provider Kaspersky’s support website got hacked and details are published at this blog.

Kasperksy admitted that it’s their fault and blamed an ‘external’ developer for the vulnerable code. Though it’s unlikely that the developer intentionally created the vulnerable code, but it slipped the normal review process of kasperksy.

Kaspersky became aware of the situation after being informed by one of its employee about the data breach. Though SQL injection method, hacker was able to hack the support website and posted so many screenshots of the support page. Hackers listed all the table names, but didn’t post any personal information from the database.

“They could have gotten access to some data that was stored on our servers, including 2500 email addresses of customers who signed up for a product trial and 25,000 activation codes belonging to our products but that didn’t contain personal customer references. The vulnerability found on usa.kaspersky.com did not affect any other Kaspersky Lab Internet resources, including www.kaspersky.com, the official website of the company’s headquarters”. – Kaspersky

Screenshot and other hacking details here:

http://hackersblog.org/2009/02/07/usakasperskycom-hacked-full-database-acces-sql-injection/

Explore More

China’s ‘Green Dam-Youth Escort’ Software

Green Dam Youth Escort is the censor ware developed and distributed by Chinese government to filter ‘harmful’ content. Here are some details about the working of the software. ‘Green Dam-Youth

Critical SQL injection (vulnerability) in Wati’s Official Website URL : http://www.wationline.com/

PlanetCreator reported another Critical SQL injection (vulnerability) on Wati’s Official Website URL : http://www.wationline.com/ SQL injection is a code injection technique that exploits a security vulnerability occurring in the database

Fake Login Page with XSS – IFRAME – | C B Bank – Online Electricity Billing Payment System(GBPS)

When XSS vulnerabilities on bank websites are exploited by phishers, is too late to undo the unwanted consequences. The phishers were able to inject a modified login form onto the