Kaspersky on getting hacked

Kaspersky admitted its site was hacked this week, so we exclusively speak to the UK MD to grill him on what went down and what is happening now.


EXCLUSIVE: This week IT PRO reported on security firm Kaspersky getting hit by hackers, effectively being beaten at its own game.

The breach, where cyber criminals tried to lure users into downloading fake anti-virus products with a link located on the Kaspersky website, went public without the company making any announcement on it.

Now we have managed to speak with the UK managing director Malcolm Tuck, who said Kaspersky did not feel it needed to publish a public warning as it would not have benefited anyone.

Instead it would only "have caused panic and confusion," Tuck stressed, saying the situation was identified and then rectified "very quickly."

All known affected people have now been contacted and Kaspersky is continuing to offer advice and support.

As noted in the previous report, the redirection to the fake anti-virus lasted three and a half hours and as soon as it was notified, the security firm took the affected server offline within ten minutes.

Tuck admitted that at the current time the impact of the attack is unknown, but Kaspersky is optimistic not many were affected.

"We are confident that the speed with which the situation was

dealt with has limited any impact," he said.

So what about reputation, something many consider to be the most serious impact from a breach?

"Judging by recent trends within the industry, breaches of security, especially when they occur within a security vendor's resources, do not go unnoticed," Tuck said.

"However, we are doing our utmost to contain the impact of the incident and reassure our customers that they are secure and protected."

As for the specifics of the hack, when IT PRO spoke to the Russian company earlier this week, it admitted an attack had exploited a vulnerability in a third party app used for website admin.

The issue affected "a very small number" of Kaspersky customers in the US, Tuck said, claiming no individual's details were compromised from the firm's web servers during the attack.

Tuck was unwilling to divulge any more information due to the fact an investigation is ongoing and until it is completed, we will not learn any more.

"Our researchers are currently working on identifying any possible consequences of the attack for affected users and are available to provide help to remove the fake anti-virus software," he added.

What this case brings up is the question of public disclosure. Kaspersky was evidently very quick to respond to the actual hack and in contacting affected parties, but it was not willing to let the wider community know about the situation. Whether this is the right approach or not is a debate that will no doubt rage on.

Featured Resources

Modern governance: The how-to guide

Equipping organisations with the right tools for business resilience

Free Download

Cloud operational excellence

Everything you need to know about optimising your cloud operations

Watch now

A buyer’s guide to board management software

Improve your board’s performance

The real world business value of Oracle autonomous data warehouse

Lead with a 417% five-year ROI

Download now


Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

Dell XPS 15 (2021) review: The best just got better

Dell XPS 15 (2021) review: The best just got better

14 Jan 2022
Sony pulls out of MWC 2022
Business operations

Sony pulls out of MWC 2022

14 Jan 2022
Synology DiskStation DS2422+ review: A cube of great capacity
network attached storage (NAS)

Synology DiskStation DS2422+ review: A cube of great capacity

10 Jan 2022