Little Internet users can do to thwart 'Heartbleed' bug

BOSTON Wed Apr 9, 2014 5:38pm EDT

The word 'password' is pictured on a computer screen in this picture illustration taken in Berlin May 21, 2013. REUTERS/Pawel Kopczynski

The word 'password' is pictured on a computer screen in this picture illustration taken in Berlin May 21, 2013.

Credit: Reuters/Pawel Kopczynski

BOSTON (Reuters) - Security experts warn there is little Internet users can do to protect themselves from the recently uncovered "Heartbleed" bug that exposes data to hackers, at least not until exploitable websites upgrade their software.

Researchers have observed sophisticated hacking groups conducting automated scans of the Internet in search of Web servers running a widely used web encryption program known as OpenSSL that makes them vulnerable to the theft of data, including passwords, confidential communications and credit card numbers.

OpenSSL is used on about two-thirds of all web servers, but the issue has gone undetected for about two years.

Kurt Baumgartner, a researcher with security software maker Kaspersky Lab, said his firm uncovered evidence on Monday that a few hacking groups believed to be involved in state-sponsored cyber espionage were running such scans shortly after news of the bug first surfaced on Monday.

By Tuesday, Kaspersky had identified such scans coming from "tens" of actors, and the number increased on Wednesday after Rapid7 released a free tool for conducting such scans.

"The problem is insidious," he said. "Now it is amateur hour. Everybody is doing it."

OpenSSL software is used on servers that host websites but not PCs or mobile devices, so even though the bug exposes passwords and other data entered on those devices to hackers, it must be fixed by website operators.

"There is nothing users can do to fix their computers," said Mikko Hypponen, chief research officer with security software maker F-Secure.

Representatives for Facebook Inc, Google and Yahoo Inc told Reuters that have taken steps to mitigate the impact on users.

Google spokeswoman Dorothy Chou told Reuters: "We fixed this bug early and Google users do not need to change their passwords."

Ty Rogers, a spokesman for online commerce giant Amazon.com Inc, said "Amazon.com is not affected." He declined to elaborate.

Kaspersky Lab's Baumgartner noted that devices besides servers could be vulnerable to attacks because they run software programs with vulnerable OpenSSL code built into them.

They include versions of Cisco Systems Inc's AnyConnect for iOS and Desktop Collaboration, Tor, OpenVPN and Viscosity from Spark Labs. The developers of those programs have either updated their software or published directions for users on how to mitigate potential attacks.

Steve Marquess, president of the OpenSSL Software Foundation, said he could not identify other computer programs that used OpenSSL code that might make devices vulnerable to attack.

CLEANING UP MESS

Bruce Schneier, a well-known cryptologist and chief technology officer of Co3 Systems, called on Internet firms to issue new certificates and keys for encrypting Internet traffic, which would render stolen keys useless.

That will be time-consuming, said Barrett Lyon, chief technology officer of cybersecurity firm Defense.Net Inc. "There's going to be lots of chaotic mess," he said.

Symantec Corp and GoDaddy, two major providers of SSL technology, said they do not charge for re-keying their certificates.

Mark Maxey, a director with cybersecurity firm Accuvant, said it is no easy task for large organizations to implement the multiple steps to clean up the bug, which means it will take some a long time to do so.

"Due to the complexity and difficulty in upgrading many of the affected systems, this vulnerability will be on the radar for attackers for years to come," he said.

Hypponen said computer users could immediately change passwords on accounts, but they would have to do so again if their operators notify them that they are vulnerable.

"Take care of the passwords that are very important to you," he said. "Maybe change them now, maybe change them in a week. And if you are worried about your credit cards, check your credit card bills very closely."

(Reporting by Jim Finkle; Additional reporting by Joseph Menn; Editing by Leslie Adler and Dan Grebler)

FILED UNDER:
We welcome comments that advance the story through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. For more information on our comment policy, see http://blogs.reuters.com/fulldisclosure/2010/09/27/toward-a-more-thoughtful-conversation-on-stories/
Comments (16)
Pfc wrote:
OK. Everyone run for the exits. Your eMail and commercial account passwords have been compromised according to Codenomicon, an unknown branch of the NSA.

Run. Now. Ask no questions. Do it. We have only your best interests at heart.

Apr 08, 2014 10:54pm EDT  --  Report as abuse
Neurochuck wrote:
Perhaps this article does not stress enough that people and organisations may have had their security credentials stolen while using inSecureSocketsLayer (https) for internet banking, shopping, …
This requires you, the user, to change passwords, or obtain new certificates, etc.
Dan Goodin, the Security Editor at Ars Technica, calls this a “catastrophic bug”
http://arstechnica.com/security/2014/04/critical-crypto-bug-in-openssl-opens-two-thirds-of-the-web-to-eavesdropping/

Apr 09, 2014 3:06am EDT  --  Report as abuse
Oh noes! A popular open-source solution used by everyone and their lolcat has major security holes? Say it ain’t so! This must be the most unexpected news since the shocking revelation that American spy agencies actually spy on people. I guess the users forgot to do their due diligence to learn coding and thoroughly study the entire source code before implementing it, knowing that every two-bit hacker would do the same.

Apr 09, 2014 8:11am EDT  --  Report as abuse
This discussion is now closed. We welcome comments on our articles for a limited period after their publication.