Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

NIST National Vulnerability Database Taken Offline Due to Malware Attack

A malware infection has led administrators at the National Institute of Standards and Technology to take the U.S. National Vulnerability Database (NVD) offline.

The NVD site currently bears the following message: “Site/Page Not Available. The NIST National Vulnerability Database (NVD) has experienced an issue with its Web Services and is currently not available. We are working to restore service as quickly as possible. We will provide updates as soon as new information is available.”

A malware infection has led administrators at the National Institute of Standards and Technology to take the U.S. National Vulnerability Database (NVD) offline.

The NVD site currently bears the following message: “Site/Page Not Available. The NIST National Vulnerability Database (NVD) has experienced an issue with its Web Services and is currently not available. We are working to restore service as quickly as possible. We will provide updates as soon as new information is available.”

When contacted by SecurityWeek, Gail Porter of NIST’s Public Inquiries office said in a statement that the NVD site and several other NIST-hosted Websites are unavailable due to the discovery of malware on two NIST Web servers.

“On Friday March 8, a NIST firewall detected suspicious activity and took steps to block unusual traffic from reaching the Internet,” Porter said. “NIST began investigating the cause of the unusual activity and the servers were taken offline.”

Porter added that the malware discovered on the Web servers was traced to a software vulnerability, but did not note in the statement what the vulnerability was or what software was affected.

“Currently there is no evidence that NVD or any other NIST public pages contained or were used to deliver malware to users of these NIST Web sites,” Porter said. “NIST continually works to maintain the integrity of its IT infrastructure and acts to limit the impact of malware on its systems. We regret the impact this has had on our services.”

The organization is continuing to respond to the incident and will restore the servers as quickly as possible, Porter added.

Written By

Click to comment

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Cybercrime

Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Malware & Threats

Cybercrime in 2017 was a tumultuous year "full of twists and turns", with new (but old) infection methods, a major return to social engineering,...

Cyberwarfare

Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.

Malware & Threats

Norway‎-based DNV said a ransomware attack on its ship management software impacted 1,000 vessels.