Showing posts with label Heartbleed. Show all posts
Showing posts with label Heartbleed. Show all posts

Tuesday, 29 April 2014

Heartbleed used against net thieves must visit

correspondent, BBC News


 Radiator and thermostat Heartbleed has put many smart home heating systems and other devices at risk. The Heartbleed bug has turned cyber criminals from attackers into victims as researchers use it to grab material from chatrooms where they trade data.



Discovered in early April, Heartbleed lets attackers steal data from computers using vulnerable versions of some widely used security programs.


Now it has given anti-malware researchers access to forums that would otherwise be very hard to penetrate.


The news comes as others warn that the bug will be a threat for many years.


French anti-malware researcher Steven K told the BBC: "The potential of this vulnerability affecting black-hat services (where hackers use their skills for criminal ends) is just enormous."


Heartbleed had put many such forums in a "critical" position, he said, leaving them vulnerable to attack using tools that exploit the bug.


The Heartbleed vulnerability was found in software, called Open SSL, which is supposed to make it much harder to steal data. Instead, exploiting the bug makes a server hand over small chunks of the data it has just handled - in many cases login details or other sensitive information.


Mr K said he was using specially written tools to target some closed forums called Darkode and Damagelab.


"Darkode was vulnerable, and this forum is a really hard target," he said. "Not many people have the ability to monitor this forum, but Heartbleed exposed everything."


Charlie Svensson, a computer security researcher at Sentor, which tests company's security systems, said: "This work just goes to show how serious Heartbleed is. You can get the keys to the kingdom, all thanks to a nice little heartbeat query."


Individuals who repeat the work of security researchers such as Mr K could leave themselves open to criminal charges for malicious hacking.

Threat 'growing'

The widespread publicity about Heartbleed had led operators of many websites to update vulnerable software and urge users to change passwords.


Paul Mutton, a security researcher at net monitoring firm Netcraft, explained that while that meant there was no "significant risk of further direct exploitation of the bug", it did not mean all danger had passed.


He said the problem had been compounded by the fact that a large number of sites had not cleaned up all their security credentials put at risk by Heartbleed.


In particular, he said, many sites had yet to invalidate or revoke the security certificates used as a guarantee of their identity.


"If a compromised certificate has not been revoked, an attacker can still use it to impersonate that website," said Mr Mutton.

Heartbleed logo The dangers posed by Heartbleed will persist for years, warn security experts

In addition, he said, web browsers did a poor job of checking whether security certificates had been revoked.


"Consequently, the dangers posed by the Heartbleed bug could persist for a few more years."


His comments were echoed by James Lyne, global head of security research at security software developer Sophos.


"There is a very long tail of sites that are going to be vulnerable for a very long time," said Mr Lyne, who pointed out that the list of devices that Heartbleed put at risk was growing.


Many so-called smart devices, such as home routers, CCTV cameras, baby monitors and home-management gadgets that control heating and power, were now known to be vulnerable to Heartbleed-based attacks, he said.


A survey by tech news site Wired found that smart thermostats, cloud-based data services, printers, firewalls and video-conferencing systems were all vulnerable.


Other reports suggest the makers of some industrial control systems are also now producing patches for their software to limit the potential for attack.


How tempting this was for malicious attackers was difficult to gauge, said Mr Lyne.


"We do not really know how much Heartbleed is being used offensively because it's an attack that is hard to track and log."


View the original article here

Wednesday, 16 April 2014

First Heartbleed 'hacker' arrested must visit

Statement from the Canada Revenue Agency The Canada Revenue Agency said that more than 900 social insurance numbers had been stolen A 19-year-old Canadian became the first person to be arrested in relation to the Heartbleed security breach.


Stephen Arthuro Solis-Reyes from London, Ontario was accused of hacking into the Canadian Revenue Agency (CRA)'s website last Friday by the Royal Canadian Mounted Police.


The RCMP say Mr Solis-Reyes then stole 900 social insurance numbers.


In a separate development, UK parenting site Mumsnet has provided fresh details about how it fell victim to the bug.


The site has published a post explaining how a hacker hijacked several accounts last week - including one belonging to Mumsnet's founder Justine Roberts - after exploiting the cryptology flaw to expose the owners' credentials.


"I hope the actions of hijacking Justine's account help draw attention to how big a deal this is," the hacker wrote on the social network.


"I suspect a lot of people would not have taken it seriously otherwise. Be thankful that the person who got access to the server information was kind enough to let you all know (and at least try and be funny with it) instead of simply sitting on the information."

Canada arrest

The Heartbleed bug was made public a week ago by Google and Codenomicon, a small Finnish security firm, which independently identified the problem.


The bug exploits a flaw in OpenSSL - a cryptographic software library used by services to keep data transmissions private.


Canada's tax agency was one of the first major organisations to cut services as a result the security flaw.


However, the action came too late.


"It is believed that [Mr] Solis-Reyes was able to extract private information held by CRA by exploiting the vulnerability known as the Heartbleed bug," the RCMP said in a statement.


The RCMP, which has been investigating the breach for four days, charged Mr Solis-Reyes with "unauthorized use of a computer" and "mischief in relation to data".


He is expected to appear in court on 17 July 2014.


Security experts warn that more attacks could be revealed soon, as firms and governments work to determine whether or not their systems are vulnerable.


View the original article here