Kaspersky PURE 3.0 is equipped with a unique and efficient array of technologies to protect its users from any form of cyber-attack. In addition, according to Kaspersky Lab research, more than 5,000 websites are compromised daily, including popular banking and shopping websites. A study conducted by Kaspersky Lab showed that 70% of phishing emails trick victims into visiting malicious, cleverly-forged websites for the sole purpose of stealing their bank credentials. With 77% of computer users regularly shopping online, according to a study conducted by 0+K Research in 2012, it’s easy to imagine how many transactions occur daily, and how many credit card numbers are at the fingertips of cyber-criminals. Total Security That Delivers the Ultimate PC Protection Offering everything users need in a computer security suite, including online banking security, password management, and online backup, Kaspersky PURE 3.0 offers maximum protection for users to secure their online activities and digital assets across their home network of PCs. Woburn, MA - MaKaspersky Lab today announced the new version of its premier product for consumer PC protection – Kaspersky PURE 3.0 Total Security. Kaspersky Lab announces the newest version of its flagship product to protect your PCs, financial data, passwords, photos and more. Kaspersky explained that while passwords could be discovered by an attacker, this would be unlikely as the attacker would need to know the user’s account information, the exact time that a password was generated, and that KPM was used by that individual.Kaspersky PURE 3.0 Total Security - Award Winning Technologies Deliver the Ultimate Protection for Your Computer An advisory about the flaw was published by Kaspersky on April 27, 2021.Īny user of KPM that has not applied the updates should do so as soon as possible and follow the advice of the solution to change any weak passwords. After applying the update, notifications were displayed to users telling them that weak passwords needed to be regenerated. The flaw was assigned CVE-2020-27020 and was corrected in KPM 9.0.2 Patch M on October 13, 2020. The vulnerability was reported to Kaspersky in June 2019, and updates were issued between October 2019 and December 2019, but they failed to fully fix the problem. “Knowing the creation date of an account, an attacker can try to bruteforce the account password with a small range of passwords (~100) and gain access to it.” “It is quite common that web sites or forums display the creation time of accounts,” explained the researchers. “For example, there are 315619200 seconds between 20, so KPM could generate at most 315619200 passwords for a given. “The consequences are obviously bad: every password could be bruteforced,” explained the researchers. Since the current system time was the random seed value, the password manager would generate identical passwords at any given time for all users worldwide. ![]() While several issues were found with the solution, the main problem was the PRNG was not suitable for cryptographic purposes, as the single source of entropy was the current time in seconds. Those policies are set for password length and the characters that must be included (upper/lower case letters, numbers, special characters). ![]() Password generation in KPG involves suggesting a password based on the policy created by the user. ![]() As a result, any passwords generated could be brute forced in a matter of minutes, and in seconds if the approximate time that the account password was created is known. In a recent blog post, researchers at security firm Donjon said the pseudo-random number generator (PRNG) used by the KPM solution was not sufficiently random to create strong passwords. Password managers often include a password generator to help users create unique, random, complex passwords for their accounts. Security researchers have discovered the random password generator of the Kaspersky Password Manager (KPM) was generating passwords that were susceptible to brute force attacks. Flaw in Kaspersky Password Manager Password Generator Made Passwords Susceptible to Brute Force Attacks
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |