Connect with us

Hi, what are you looking for?

HEADLINES

Heartbleed bug allows hackers to steal your most sensitive information

Servers running the OpenSSL for the last 2 years, unless patched rightaway, may have revealed to hackers sensitive data due to a serioud Internet vulnerability dubbed “Heartbleed.”

Servers running the OpenSSL for the last 2 years, unless patched rightaway, may have revealed to hackers sensitive data due to a serioud Internet vulnerability dubbed "Heartbleed."

Servers running the OpenSSL for the last two years, unless patched right away, may have revealed to hackers sensitive data due to a serious Internet vulnerability dubbed “Heartbleed.” The worst thing about this bug is that it is easy to exploit, and doesn’t even leave a trace, say security experts.

One of the most used security technologies is SSL (secure sockets layer), which is found in what we see as a “lock” in our browser when we type https://domain.xyz (rather than http://). The ramifications are very serious as OpenSSL may secure e-banking, e-commerce, social media, webmail, email, and so on. Practically every aspect of the Internet may rely on OpenSSL at the backend.

The Finnish digital forensics and security company Codenomicon (http://www.codenomicon.com) has independently uncovered the “heartbleed bug” in the popular OpenSSL found on many of the web hosts, which can leak out critical information such as the secret Private Keys which lock passwords and our data, to malicious hackers.

The bug was named Heartbleed by Codenomicon because it occurs in OpenSSL’s implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension. When it is exploited, it leads to the leak of memory contents from the server to the client and from the client to the server. The same weakness also exists in the client-side implementations of OpenSSL.

Advertisement. Scroll to continue reading.

By exposing the memory contents of a Web site’s server, the Heartbleed vulnerability potentially allows attackers to steal the most sensitive information such as private encryption keys, session cookies and passwords.

The encryption bug also affects the equipment that connects the Web. Cisco Systems Inc. and Juniper Networks Inc., have said that some of their products contain the “Heartbleed” bug. Cisco said it would update customers when it has software patches while Juniper warns the process of updating its equipment might be lengthy.

Security vendor FireEye encourages organizations to apply the patch as soon as possible.  Organizations should identify their own strategy for deployment based on their own needs and testing requirements, however FireEye recommends the following:

  • All externally facing servers be patched first to reduce the potential number individuals who could connect to a vulnerable system.
  • Patch any servers providing authentication which could leak legitimate credentials to a hacker.
  • Then patch any servers that containing sensitive data including personally identifiable information (PII), customer data, critical intellectual property, or those conducting financial transactions.
  • Then pursue a strategy to patch all other internal systems.
  • Identify partner organizations websites that employees may use, and ensure that these other websites have been secured as well.
  • Create, install / deploy new certificate(s). Organizations who suspect being attacked already, should also consider revocation of the old keypairs that were just superseded, and also invalidating all session keys and cookies.

In addition, organisations should perform network scans as soon as possible.  Organisations need to identify if any of other devices may be running OpenSSL as well.  This could include appliances, wireless access points, routers, or pretty much anything else that may use SSL.  As an example, several different types of voice over IP (VOIP) phones used in the corporate environment run SSL.  For these other devices, organizations may need to work with their vendors to apply a patch, firmware, or solution to ensure that all equipment.

Finally, organisations will want to ensure appropriate logging is enabled on their servers, and conduct increased auditing to determine if any unauthorized users are leveraging compromised credentials that may have already been leaked.  As the credentials are legitimate, auditing serves as one of the best ways to identify anomalous activity.  Auditors should be on the lookout for anything outside of the normal including logins for different geographic regions, extreme off hour activity, increase in outbound bandwidth usage, and other similar activity.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Someone illegally acquires or uses personal information such as bank account or credit card numbers of another person to obtain money, goods or services....

HEADLINES

To stay ahead of these challenges, organizations need to invest in AI-driven defenses, transition to quantum-safe encryption, and adopt a Zero Trust approach to...

HEADLINES

There was a 121% Year-on-Year (YoY) increase in identity fraud in 2024 across the region, with significant surges recorded in Singapore (207%), Thailand (206%)...

HEADLINES

As part of RCBC’s 2024 Cybersecurity literacy program, the webinar aims to help Filipinos level up their online banking safety by providing them with...

White Papers

The survey found that CXO’s feel less prepared than their global peers. Less than half or 48% in APAC said they felt completely prepared...

HEADLINES

On average, a single organization in the Philippines experiences 4,003 attacks per week, significantly higher than the APAC average of 2,870 attacks per week.

White Papers

Exploiting this vulnerability, cybercriminals craft deceptively authentic phishing emails that align with current trends, exploiting human emotions to invoke urgency and trick recipients into...

HEADLINES

As the year 2024 draws to a close, cybersecurity solutions provider Fortinet unveiled predictions that expect hackers will leverage as well as trends that...

Advertisement