Report: NASDAQ was slow to plug vulnerabilities affecting its site

Share this article:
Swiss penetration testing company High-Tech Bridge reported the vulnerability to NASDAQ.
Swiss penetration testing company High-Tech Bridge reported the vulnerability to NASDAQ.

A Switzerland-based penetration testing firm, High-Tech Bridge, revealed that vulnerabilities in NASDAQ's website were left unpatched for weeks.

IIia Kolochenko, CEO at High-Tech Bridge, told the NY Daily News on Monday that he discovered the flaws on the stock exchange's website “in just 10 minutes with a Firefox browser without any special tools or software.”

The bugs could have allowed an attacker to carry out cross-site scripting (XSS) attacks, meaning a hacker could inject HTML code into a site to steal visitors' data, like cookies, or manipulate what they see, the outlet reported.

The issue has since been fixed by NASDAQ as of Monday, according to reports, but long after Kolochenko notified the stock exchange of the issue on Sept. 2.

In a Tuesday statement emailed to SCMagazine.com, NASDAQ said that it responded “immediately” to High-Tech Bridge's warnings.

“We take all information security matters seriously,” the statement said. “We work with leading security vendors and have a trained and professional team that evaluates all credible threats across our digital assets.”

UPDATE: In a Tuesday email Kolochenko told SCMagazine.com that he reported two vulnerabilities to NASDAQ, but that he "didn't want to dig further without their permission."

"I think that if somebody perform[ed] a more profound testing, he [could] find much more vulnerabilities, and probably even more dangerous ones than XSS," he wrote. Kolochenko added that NASDAQ moved to address the issue when they got word of the issue being publicized.
 

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.