Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Poodle returns to torment 10% of Global Sites

9/12/2014 by Sharon Shahzad

W1siziisijiwmtqvmtivmdkvmtyvmtmvndyvode2l1bvb2rszs5qcgcixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

About 10% of the world’s servers could be vulnerable to a new POODLE attack campaign repurposed to target TLS, according to security experts.

The POODLE attack revealed by Google in October worked when hackers with full control of a network from client to server were able to force a “fallback” to the less secure SSL 3.0 encryption protocol and decrypt the victim’s HTTPS traffic using a “padding oracle” technique. 

However, "Padding Oracle On Downgraded Legacy Encryption," to give it its full name, was virtually eliminated as browser vendors like Google disabled SSL 3.0, largely shutting down that particular attack vector.

The latest threat is easier to exploit than the ones spotted in October because it doesn’t require the hacker to force a downgrade to SSL 3.0 first – instead it targets the TLS 1.2 encryption standard.

“If you recall, SSL 3 doesn’t require its padding to be in any particular format (except for the last byte, the length), opening itself to attacks by active network attackers,” wrote Qualys director of application security research, Ivan Ristic.

“However, even though TLS is very strict about how its padding is formatted, it turns out that some TLS implementations omit to check the padding structure after decryption. Such implementations are vulnerable to the POODLE attack even with TLS.”

Ristic added that the attacks are mainly targeted at browsers as the attacker has to inject malicious JavaScript to begin the attack.

This article has been extracted from http://www.infosecurity-magazine.com, please click on this link to read the article in full http://www.infosecurity-magazine.com/news/poodle-returns-to-torment-10-of/

Montash is a multi-award winning, global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy & Technologies, Demand IT and Business Engagement, Digital and E-commerce, Leadership Talent, Infrastructure and Service Delivery, Project and Programme Delivery.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdmvmdgvmdkvmzkvmtqvmzgxl3dvbwvuigluigj1c2luzxnzlmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Dear 18-year-old me: It’s a woman’s world too

2017-03-08 09:00:00 +0000

With International Women’s Day being all about celebrating the cultural, economic, political and social achievements of women, it highlights the issue of women in technology, which remains a contentious one. Recent research from WISE, which campaigns for gender balance in science, technology and engineering, found that women only make up just 17 per cent of all IT professionals in the UK. Montash Recruitment Consultant Sadiye Booker has shared her exper...

W1siziisijiwmtcvmdivmtuvmtyvntivmjuvnzkwl2n5ymvyigf0dgfja3muanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

UK threatened by serious cyber attacks every ...

2017-02-15 16:00:00 +0000

The security of the UK has been threatened by 188 serious cyber attacks in the last three months, a government security chief has said. National Cyber Security Centre (NCSC) Chief Executive Ciaran Martin told The Sunday Times that national security was put at risk by many of these attacks. Martin was speaking ahead of the official opening of the NCSC, which has been set up to protect critical services in the UK from such attacks and improve underlying i...