UPDATED with comment from Kaspersky.
Kaspersky antivirus software let websites track users for years, a German journalist revealed today (Aug. 15).
"That's a remarkably bad idea," Eikenberg wrote in the English version of his article (it's also available in German). "Other scripts running in the context of the website domain can access the entire HTML source any time, which means they can read the Kaspersky ID. In other words, any website can read the user's Kaspersky ID and use it for tracking."
You can disable the Kaspersky ID injection entirely by going into your Kaspersky software's settings, then Additional/Network, then locating Traffic Processing and unchecking "Inject script into web traffic to interact with web pages."
MORE: Best Antivirus Software
Eikenberg set up a website that would read the Kaspersky ID of visiting computers and display it back to them, and asked his c't colleagues to browse to his site.
"From that moment on, my test page greeted them personally whenever they opened the site -- no matter which browser they used or how often they deleted cookies," he wrote. "Even the incognito mode did not offer any protection against my Kaspersky-infused tracking. At this point, it was clear that this was a serious security issue."
Whoops, our bad
Eikenberg notified Kaspersky of the problem, and after a couple of weeks, the company confirmed that the issue existed on all versions of Kaspersky antivirus software, ranging from Kaspersky Free Anti-Virus to Kaspersky Total Security, dating back to the fall of 2015.
"Several million users must have been exposed" overall, Eikenberg reasoned.
The company downplayed the danger of the tracking ID, but nonetheless fixed it in June with a security patch for all affected Kaspersky software and published a security advisory alerting users to the flaw.
At his request, Eikenberg said, the company also registered the bug with the Common Vulnerabilities and Exposures (CVE) bug-tracking system run by the MITRE Corporation outside Boston, so now it has its own CVE number.
Kasperky has been viewed with extreme suspicion by U.S. governmental agencies who fear its antivirus software could be used for espionage or sabotage on the part of the Russian government. The company's products have effectively been banned from U.S. government agencies and defense contractors.
The German federal government has found no evidence that Kaspersky is up to any kind of no good, and we here at Tom's Guide have yet to be convinced that Kasperky software is unsafe to use for most people. But this arguably minor incident will only enhance some people's suspicions about Kaspersky.
Tom's Guide has reached out to Kaspersky for comment, and we will update this story when we receive a response.
Not out of the woods yet?
Eikenberg installed the June patch on his and his colleagues' machines, and found that Kaspersky software still injects an ID into every displayed web page. The difference is that the ID is now identical for all machines running the same version of Kaspersky software.
Of course, "that is actually valuable information to an attacker," as Eikenberg wrote. "They may use that information to distribute malware tailored to the protection software, or to redirect the browser to a suitable scamming page."
Eikenberg has reported that to Kaspersky as a separate flaw.
UPDATE: Kaspersky responded to our query for comment with this statement, in full:
"Kaspersky has changed the process of checking web pages for malicious activity by removing the usage of unique identifiers for the GET requests. This change was made after Ronald Eikenberg reported to us that using unique identifiers for the GET requests can potentially lead to the disclosure of a user's personal information.
"After our internal research, we have concluded that such scenarios of user's privacy compromise are theoretically possible but are unlikely to be carried out in practice, due to their complexity and low profitability for cybercriminals. Nevertheless, we are constantly working on improving our technologies and products, resulting in a change in this process. We'd like to thank Ronald Eikenberg for reporting this to us."