Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Study concludes 'Heartbleed' flaw was unknown before disclosure

10/09/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmtuvmzgvnzuvzmlszsjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

One of the most serious software flaws to affect the Internet, nicknamed "Heartbleed," was likely unknown before it was publicly disclosed, according to new research.

The finding puts to rest fears that government spying agencies may have been exploiting the flaw for surveillance activities.

Widespread attacks using Heartbleed only began about a day after information about it became public, according to the paper, published by researchers at several U.S. universities.

"We find no evidence of exploitation prior to the vulnerability's public disclosure, but we detect subsequent exploit attempts from almost 700 sources beginning less than 24 hours after disclosure," they wrote.

Heartbleed was a flaw in older versions of OpenSSL, a widely used cryptographic library that encrypts data traffic between a client and a server. In some cases, Heartbleed leaked memory from a server, potentially exposing login credentials, cryptographic keys and other private data.

Its disclosure on April 7 set off a scramble to patch. Upwards of 55 percent of the top one million websites ranked by traffic by Alexa were affected, many of which were quickly patched.

To figure out if attacks had been executed against OpenSSL prior to disclosure of the flaw, the researchers analyzed network traffic collected by passive traps at Lawrence Berkeley National Laboratory, the National Energy Research Scientific Computing Center and a honeypot on Amazon's EC2 network.

The networks collectively had full packet traces available from around November 2013 through April. No tell-tale signs that attackers were trying to exploit Heartbleed were found, although such scanning for vulnerable servers "could have occurred during other time periods," they cautioned.

The first attacks were detected 21 hours and 29 minutes after Heartbleed became public from a host at the University of Latvia, they wrote. Soon after, the attacks came fast and furious.

Two days after Heartbleed was disclosed, about 11 percent of the top 1 million sites ranked by Alexa were still vulnerable. The top 500 sites, however, had all patched within that same period.

Three weeks after disclosure, the researchers began contacting the operators of more than 200,000 hosts that were still vulnerable, a laborious undertaking. They did that by extracting the "abuse" email contacts from Whois records.

This article has been extracted from http://news.techworld.com/, please click on this link to read the article in full http://news.techworld.com/security/3544381/study-concludes-heartbleed-flaw-was-unknown-before-disclosure/

Montash is a multi-award winning, global technology recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdivmtuvmtyvntivmjuvnzkwl2n5ymvyigf0dgfja3muanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

UK threatened by serious cyber attacks every ...

2017-02-15 16:00:00 +0000

The security of the UK has been threatened by 188 serious cyber attacks in the last three months, a government security chief has said. National Cyber Security Centre (NCSC) Chief Executive Ciaran Martin told The Sunday Times that national security was put at risk by many of these attacks. Martin was speaking ahead of the official opening of the NCSC, which has been set up to protect critical services in the UK from such attacks and improve underlying i...

W1siziisijiwmtcvmdivmdgvmtavmzcvmzkvnjkyl0n5ymvyifnly3vyaxr5lmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

British cyber security workforce rises 163%

2017-02-08 10:00:00 +0000

Data from the UK has shown that the cyber security workforce has grown considerably over the past five years. According to a new report from cyber skills promotion network Tech Partnership, there are now 58,000 more workers in this industry – a rise of 163 per cent. It shows the growing importance of these professionals, with firms across a vast range of industries turning to cyber security specialists to safeguard their data. To collate the report, the...