Connect with us

Hi, what are you looking for?

HEADLINES

Heartbleed bug allows hackers to steal your most sensitive information

Servers running the OpenSSL for the last 2 years, unless patched rightaway, may have revealed to hackers sensitive data due to a serioud Internet vulnerability dubbed “Heartbleed.”

Servers running the OpenSSL for the last 2 years, unless patched rightaway, may have revealed to hackers sensitive data due to a serioud Internet vulnerability dubbed "Heartbleed."

Servers running the OpenSSL for the last two years, unless patched right away, may have revealed to hackers sensitive data due to a serious Internet vulnerability dubbed “Heartbleed.” The worst thing about this bug is that it is easy to exploit, and doesn’t even leave a trace, say security experts.

One of the most used security technologies is SSL (secure sockets layer), which is found in what we see as a “lock” in our browser when we type https://domain.xyz (rather than http://). The ramifications are very serious as OpenSSL may secure e-banking, e-commerce, social media, webmail, email, and so on. Practically every aspect of the Internet may rely on OpenSSL at the backend.

The Finnish digital forensics and security company Codenomicon (http://www.codenomicon.com) has independently uncovered the “heartbleed bug” in the popular OpenSSL found on many of the web hosts, which can leak out critical information such as the secret Private Keys which lock passwords and our data, to malicious hackers.

The bug was named Heartbleed by Codenomicon because it occurs in OpenSSL’s implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension. When it is exploited, it leads to the leak of memory contents from the server to the client and from the client to the server. The same weakness also exists in the client-side implementations of OpenSSL.

Advertisement. Scroll to continue reading.

By exposing the memory contents of a Web site’s server, the Heartbleed vulnerability potentially allows attackers to steal the most sensitive information such as private encryption keys, session cookies and passwords.

The encryption bug also affects the equipment that connects the Web. Cisco Systems Inc. and Juniper Networks Inc., have said that some of their products contain the “Heartbleed” bug. Cisco said it would update customers when it has software patches while Juniper warns the process of updating its equipment might be lengthy.

Security vendor FireEye encourages organizations to apply the patch as soon as possible.  Organizations should identify their own strategy for deployment based on their own needs and testing requirements, however FireEye recommends the following:

  • All externally facing servers be patched first to reduce the potential number individuals who could connect to a vulnerable system.
  • Patch any servers providing authentication which could leak legitimate credentials to a hacker.
  • Then patch any servers that containing sensitive data including personally identifiable information (PII), customer data, critical intellectual property, or those conducting financial transactions.
  • Then pursue a strategy to patch all other internal systems.
  • Identify partner organizations websites that employees may use, and ensure that these other websites have been secured as well.
  • Create, install / deploy new certificate(s). Organizations who suspect being attacked already, should also consider revocation of the old keypairs that were just superseded, and also invalidating all session keys and cookies.

In addition, organisations should perform network scans as soon as possible.  Organisations need to identify if any of other devices may be running OpenSSL as well.  This could include appliances, wireless access points, routers, or pretty much anything else that may use SSL.  As an example, several different types of voice over IP (VOIP) phones used in the corporate environment run SSL.  For these other devices, organizations may need to work with their vendors to apply a patch, firmware, or solution to ensure that all equipment.

Finally, organisations will want to ensure appropriate logging is enabled on their servers, and conduct increased auditing to determine if any unauthorized users are leveraging compromised credentials that may have already been leaked.  As the credentials are legitimate, auditing serves as one of the best ways to identify anomalous activity.  Auditors should be on the lookout for anything outside of the normal including logins for different geographic regions, extreme off hour activity, increase in outbound bandwidth usage, and other similar activity.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

HEADLINES

The Philippines’ global ranking for local threats rose from 76th to 66th, highlighting the need for stronger cybersecurity measures.

HEADLINES

Despite 65% having adopted generative artificial intelligence (GenAI capabilities), 89% of IT leaders are concerned that flaws in GenAI cybersecurity tools could put their...

APPS

PSBank is reinforcing its commitment to security through key enhancements to its PSBank Mobile app.

White Papers

Hyper-personalized attacks and agent AI subversion will require industry-wide effort to root out and address. Business leaders should remember that there’s no such thing...

HEADLINES

GCash, a financial super app and cashless ecosystem, reaffirmed its commitment to trust, security, and collaboration with customers, stakeholders, and law enforcement to ensure...

HEADLINES

Senator Mark Villar recently filed a resolution seeking a senate inquiry on the trade of International Mobile Subscriber Identity (IMSI) catchers, which allow fraudsters...

Advertisement