One of the most serious software flaws to affect the Internet, nicknamed "Heartbleed," was likely unknown before it was publicly disclosed, according to new research.
The finding puts to rest fears that government spying agencies may have been exploiting the flaw for surveillance activities.
Widespread attacks using Heartbleed only began about a day after information about it became public, according to the paper, published by researchers at several U.S. universities.
"We find no evidence of exploitation prior to the vulnerability's public disclosure, but we detect subsequent exploit attempts from almost 700 sources beginning less than 24 hours after disclosure," they wrote.
Heartbleed was a flaw in older versions of OpenSSL, a widely used cryptographic library that encrypts data traffic between a client and a server. In some cases, Heartbleed leaked memory from a server, potentially exposing login credentials, cryptographic keys and other private data.
Its disclosure on April 7 set off a scramble to patch. Upwards of 55 percent of the top one million websites ranked by traffic by Alexa were affected, many of which were quickly patched.
To figure out if attacks had been executed against OpenSSL prior to disclosure of the flaw, the researchers analyzed network traffic collected by passive traps at Lawrence Berkeley National Laboratory, the National Energy Research Scientific Computing Center and a honeypot on Amazon's EC2 network.
The networks collectively had full packet traces available from around November 2013 through April. No tell-tale signs that attackers were trying to exploit Heartbleed were found, although such scanning for vulnerable servers "could have occurred during other time periods," they cautioned.
The first attacks were detected 21 hours and 29 minutes after Heartbleed became public from a host at the University of Latvia, they wrote. Soon after, the attacks came fast and furious.
Two days after Heartbleed was disclosed, about 11 percent of the top 1 million sites ranked by Alexa were still vulnerable. The top 500 sites, however, had all patched within that same period.
Three weeks after disclosure, the researchers began contacting the operators of more than 200,000 hosts that were still vulnerable, a laborious undertaking. They did that by extracting the "abuse" email contacts from Whois records.
This article has been extracted from http://news.techworld.com/, please click on this link to read the article in full http://news.techworld.com/security/3544381/study-concludes-heartbleed-flaw-was-unknown-before-disclosure/
Montash is a multi-award winning, global technology recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:
ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.
With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.