[ISN] Kaspersky breach exposes sensitive database, says hacker

From: InfoSec News <alerts_at_private>
Date: Mon, 9 Feb 2009 00:18:46 -0600 (CST)
http://www.theregister.co.uk/2009/02/08/kaspersky_compromise_report/

By Dan Goodin in San Francisco
The Register
8th February 2009

A security lapse at Kaspersky has exposed a wealth of proprietary 
information about the anti-virus provider's products and customers, 
according to a blogger, who posted screen shots and other details that 
appeared to substantiate the claims.

In a posting made Saturday, the hacker claimed a simple SQL injection 
gave access to a database containing "users, activation codes, lists of 
bugs, admins, shop, etc." Kaspersky has declined to comment, but two 
security experts who reviewed the evidence said the claims appeared 
convincing.

"This looks very real to me," Thomas Ptacek, a researcher at security 
provider Matasano said via instant message a few hours after the post 
went live. He pointed to the address bar of one screenshot that showed 
usa.kaspersky.com along with the text "concat_ws(0x3a,ver" to the right 
of that. "It's a URL that is being used to alter the database request 
that's used to generate the page," he added. "One of them can be tricked 
into pulling arbitrary data from the database. Game over."

Roger Thompson, chief research officer at competing anti-virus provider 
AVG concurred. "/me feels sorry for Kaspersky," he wrote to El Reg. 
"Can't tell for certain, but it looks legit."

[...]


_______________________________________________      
Best Selling Security Books &amp; More!
http://www.shopinfosecnews.org/
Received on Sun Feb 08 2009 - 22:18:46 PST

This archive was generated by hypermail 2.2.0 : Sun Feb 08 2009 - 22:38:35 PST