Little Internet users can do to thwart ‘Heartbleed’ bug

BOSTON (Reuters) – Security experts warn there is little Internet users can do to protect themselves from the recently uncovered “Heartbleed” bug that exposes data to hackers, at least not until exploitable websites upgrade their software.

Researchers have observed sophisticated hacking groups conducting automated scans of the Internet in search of Web servers running a widely used web encryption program known as OpenSSL that makes them vulnerable to the theft of data, including passwords, confidential communications and credit card numbers.

OpenSSL is used on about two-thirds of all web servers, but the issue has gone undetected for about two years.

Kurt Baumgartner, a researcher with security software maker Kaspersky Lab, said his firm uncovered evidence on Monday that a few hacking groups believed to be involved in state-sponsored cyber espionage were running such scans shortly after news of the bug first surfaced on Monday.

By Tuesday, Kaspersky had identified such scans coming from “tens” of actors, and the number increased yesterday after Rapid7 released a free tool for conducting such scans. “The problem is insidious,” he said. “Now it is amateur hour. Everybody is doing it.” OpenSSL software is used on servers that host websites but not PCs or mobile devices, so even though the bug exposes passwords and other data entered on those devices to hackers, it must be fixed by website operators.

“There is nothing users can do to fix their computers,” said Mikko Hypponen, chief research officer with security software maker F-Secure.

Representatives for Facebook Inc, Google and Yahoo Inc told Reuters that have taken steps to mitigate the impact on users. Google spokeswoman Dorothy Chou told Reuters: “We fixed this bug early and Google users do not need to change their passwords.” Ty Rogers, a spokesman for online commerce giant Inc, said “ is not affected.”  He declined to elaborate.

Kaspersky Lab’s Baumgartner noted that devices besides servers could be vulnerable to attacks because they run software programs with vulnerable OpenSSL code built into them.

They include versions of Cisco Systems Inc’s AnyConnect for iOS and Desktop Collaboration, Tor, OpenVPN and Viscosity from Spark Labs. The developers of those programs have either updated their software or published directions for users on how to mitigate potential attacks. Steve Marquess, president of the OpenSSL Software Foundation, said he could not identify other computer programs that used OpenSSL code that might make devices vulnerable to attack.

Bruce Schneier, a well-known cryptologist and chief technology officer of Co3 Systems, called on Internet firms to issue new certificates and keys for encrypting Internet traffic, which would render stolen keys useless.

That will be time-consuming, said Barrett Lyon, chief technology officer of cybersecurity firm Defense.Net Inc. “There’s going to be lots of chaotic mess,” he said. Symantec Corp and GoDaddy, two major providers of SSL technology, said they do not charge for re-keying their certificates. Mark Maxey, a director with cybersecurity firm Accuvant, said it is no easy task for large organizations to implement the multiple steps to clean up the bug, which means it will take some a long time to do so.

More in World News


About these comments

The comments section is intended to provide a forum for reasoned and reasonable debate on the newspaper's content and is an extension of the newspaper and what it has become well known for over its history: accuracy, balance and fairness. We reserve the right to edit or delete comments which contain attacks on other users, slander, coarse language and profanity, and gratuitous and incendiary references to race and ethnicity.

Get the day's headlines from SN in your inbox every morning:

Most Read This Week

  1. Convicted drug trafficker Barry Dataram about to be handed over to local enforcement officials by the Suriname police. Inset is the information page in the fake passport for “David Persaud” that was being used by the fugitive. (Royston Drakes photos)

    Dataram, wife returned to Guyana

  2. Back in court: In this Keno George composite photo, Barry Dataram (left) and his wife Anjanie Boodnarine at court yesterday to answer three charges including fleeing the jurisdiction.

    Dataram to serve eight years in jail after guilty plea to new charges

  3. Yansen Brusche

    Ulverston mom of four stabbed to death by children’s father

  4. US Ambassador Perry Holloway and Finance Minister Winston Jordan shake hands after the signing of the agreement yesterday.

    Guyana inks pact for reporting to IRS on holdings of US citizens

  5. Updated: Man dies after bandits attack overseas-based Guyanese at Herstelling

  6. Barry Dataram

    Datarams getaway passports had been issued to other people

  7. Ameer Subrati

    Man dies after bandits target overseas-based couple at Herstelling

  8. Dr. Prudence Lewis-Bhola

    Prudence Lewis-Bhola appointed as CEO of broadcasting authority

  9. Cops grilling taxi driver after passenger robbed of $6M on seawall

Recommended For You