US National Vulnerability Database infected with malware
NIST Security database goes offline following hack


A malware infection has led to the US National Institute of Standards and Technology's (NIST) National Vulnerability Database being unavailable for almost a week.
The discovery of malware on the database, which lists different types of malware itself, was made last Friday. It is not know how long the database had been compromised before that.
According to a post on Google+ by Kim Halavakoski, chief security officer at Crosskey Banking Solutions in Finland, he was trying to look up vulnerability information on the database and noticed that it was offline. He then emailed the organisations to find out what was going on.
Halavakoski later got a reply from Gail Porter, Director of Public Affairs at the NIST telling him that the list was offline because of an infection on its web servers.
"The National Vulnerability Database public-facing Web site and several other NIST-hosted Web sites are currently unavailable due to discovery of malware on two NIST Web servers,"
"On Friday March 8, a NIST firewall detected suspicious activity and took steps to block unusual traffic from reaching the Internet. NIST began investigating the cause of the unusual activity and the servers were taken offline. Malware was discovered on two NIST Web servers and was then traced to a software vulnerability," said Porter.
"Currently there is no evidence that NVD or any other NIST public pages contained or were used to deliver malware to users of these NIST websites."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
She said that the organisations was continuing in its response to the incident and was acting to "limit the impact of malware on its systems."
"We regret the impact this has had on our services," added Porter.
At the time of writing the website is still down, it displays a message reading: "The NIST National Vulnerability Database (NVD) has experienced an issue with its web wervices and is currently not available. We are working to restore service as quickly as possible. We will provide updates as soon as new information is available."
Later research carried out by Halavakoshi found that the web server the database was running on was Windows Server 2008 and IIS 7.5. Post breach, an investigation by Halavakoski found the servers running Linux and Apache from 9 March.
"Hacking the NVD and planting malware on the very place where we get our vulnerability information, that is just pure evil!" said Halavakoski.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott Published
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz Published
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz Published
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz Published
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott Published
-
A critical Ivanti flaw is being exploited in the wild – here’s what you need to know
News Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances
By Solomon Klappholz Published
-
Researchers claim an AMD security flaw could let hackers access encrypted data
News Using only a $10 test rig, researchers were able to pull off the badRAM attack
By Solomon Klappholz Published
-
A journey to cyber resilience
whitepaper DORA: Ushering in a new era of cyber security
By ITPro Published