Australian businesses exposed to 'heart bleed' bug

Australian businesses exposed to 'heart bleed' bug

Patching the bug is just the start, it seems...

Twenty of Australia's ASX top 200 organisations have been exposed to the dangerous 'heart bleed' vulnerability in OpenSSL, which was revealed yesterday.
 
OpenSSL, an open-source implementation of the SSL and TLS protocols, contains a bug in its heartbeat extension that validates site connections.
 
Attackers could exploit the read-overrun bug to quietly connect to vulnerable servers which would leak memory that could include usernames and passwords and even the SSL server's private key. 
 
Those with access to the key could use it to impersonate a site even after the bug has been fixed, and likely crawl over and decrypt encrypted data. Man in the middle attacks could be performed by those with private keys in hand.
 
Scores of insecure sites have been detected and some of the biggest websites including Amazon and Wordpress have rushed to apply a patch for the two-year old vulnerability.
 
Yahoo! has also plugged the hole but failed to act on early advice from Google and Codenomicon researchers who tipped off some sites ahead of the disclosure yesterday. That led to the exposure of usernames and passwords for users of its email service.
 
Credit: @markloman
Yahoo passwords exposed
 
Statistics from metrics company Netcraft show that 66 percent of websites run open source web servers Apache and nginx which use OpenSSL as the default encryption system. 
 
HackLabs director Chris Gatford ran quick tests of the ASX top 200 organisations and found 20 which were still exposed.
 
He said applying the fix would be painful for some organisations but necessary and said attackers may target the bug for a long time.
 
Scores more sites have been found by researchers and attackers by using simple scripts and online tools.
 
Security researchers have also posted proof of concept scripts to find and hijack user sessions from vulnerable servers en masse.
 
But Google researcher Neel Mehta who helped discover the bug said exposure of private keys was unlikely due to memory allocation patterns.
 
While it remained critical that organisations apply the OpenSSL patch, doing so mitigated only one part of the threat.
 
Web administrators concerned that their website was exploited in the two years the bug existed under the radar should obtain new digital certificates. 
 
Those admins worried that attackers have gained access to private keys should join the few to deploy Perfect Forward Secrecy, a powerful tool to prevent attackers from decrypting data sent during the past two years.
 
Security boffins also advise that passwords should be changed, a step that some websites are already taking.
 
Organisations running the Snort security software should review a list of signatures for the platform which will detect successful attacks against heart bleed.

Source: Copyright © PC & Tech Authority. All rights reserved.

See more about:  infosec  |  security  |  heart bleed  |  organisations  |  private keys  |  google  |  asx top 200 organisations  |  chris gatford  |  heart  |  yahoo
 
 

Readers of this article also read...

What does a Trump win mean for tech and science? 

What does a Trump win mean for tech and science?

 
Samsung: When the giant trips 

Samsung: When the giant trips

 
How WD is making storage sexy again 

How WD is making storage sexy again

 
With Pixel, Google is barrelling headfirst into Apple’s backyard 

With Pixel, Google is barrelling headfirst into Apple’s backyard

 
19 milestones in humanity's journey through space 

19 milestones in humanity's journey through space

 
Latest articles on BIT Latest Articles from BIT
Malware discovered in online ads on popular sites
9 Dec 2016
Eset has warned that online ads are delivering images containing malware that runs without user ...
Are you certain your documents are being safely destroyed?
8 Dec 2016
So you've decided it's too much time and trouble to do your own shredding. Here's what you ...
Protect confidential files with SafeErase Professional 11
6 Dec 2016
O&O Software has released the latest version of its secure file and history eraser for Windows.
Malware takes over one million Google accounts: report
2 Dec 2016
How to tell if your account has been infected by Gooligan, the malware variant identified by ...
Boost your NAS capacity with Seagate IronWolf
29 Nov 2016
Seagate's new IronWolf Pro drive means each bay of your network attached storage device can ...

Latest Comments

From our Partners

PC & Tech Authority Downloads