April 9 (Bloomberg) -- Security experts are urging consumers to change their Web passwords after the recent disclosure of a vulnerability touching wide swaths of the Internet, even as Google Inc., Facebook Inc. and large banks said they weren’t affected.
The flaw to OpenSSL, an open-source software that runs on as many as two-thirds of all active websites, was reported on April 7, by researchers who pushed out a fix. Dubbed Heartbleed, the bug could have allowed hackers to access encrypted e-mail messages, banking information, user names and passwords.
“The one saving grace with this flaw is that it was relatively simple to spot and as a result very simple to fix,” Zully Ramzan, chief technology officer of Elastica, a cyber- security firm, wrote in an e-mail yesterday. “That said, OpenSSL is incredibly widespread. It’s literally the most popular implementation of SSL on the planet. So any compromise in its security has far reaching implications.”
The Heartbleed revelation comes at a time of mounting concern about hackers’ capabilities following consumer data breaches at Target Corp. and Neiman Marcus Group Ltd. and the spying scandal involving the National Security Agency. The flaw involving a two-year-old programming mistake was discovered by researchers from Google and Codenomicon, a security firm based in Finland, and reported to OpenSSL, according to a blog post from Codenomicon.
It isn’t known whether malicious hackers knew about the bug and were exploiting it, the researchers wrote. Google and Facebook said they addressed the problem before it was made public and saw no signs of vulnerabilities, while Yahoo! Inc. made the requisite fixes.
“A vulnerability, called Heartbleed, was recently identified impacting many platforms that use OpenSSL, including ours,” Yahoo said in an e-mailed statement. “Our team has successfully made the appropriate corrections across the main Yahoo properties,” such as the homepage, e-mail, finance and sports sites, the Sunnyvale, California-based company said.
OpenSSL is used by Internet companies to secure traffic flowing between servers and users’ computers. SSL refers to an encryption protocol known as Secure Sockets Layer and its use is indicated by a closed padlock appearing on browsers next to a website’s address.
Before Yahoo issued its fix, security researcher Mark Loman from the Netherlands demonstrated Tuesday on Twitter that he was able to force the site to leak usernames and passwords.
“It wasn’t Yahoo’s fault, yet they’re very slow at installing the critical fix,” Loman wrote on his Twitter Inc. account. “Bug disclosure was flawed too.”
Many large consumer sites running OpenSSL aren’t vulnerable to being exploited because they use specialized encryption equipment and software, the researchers wrote. A test site allows website administrators to check whether their properties are affected.
“The security of our users’ information is a top priority,” Google said in a statement yesterday. “We proactively look for vulnerabilities and encourage others to report them precisely so that we are able to fix them before they are exploited. We have assessed the SSL vulnerability and applied patches to key Google services.”
In a statement, Facebook said it “added protections for Facebook’s implementations of OpenSSL before this issue was publicly disclosed, and we haven’t detected any signs of suspicious activity on people’s accounts.”
JPMorgan Chase & Co., the largest U.S. bank, doesn’t use the vulnerable software and user information has not been exposed, the New York-based company said in a statement.
Tests on the home pages of other large technology, e- commerce and banking companies including Microsoft Corp., Amazon.com Inc. and Bank of America Corp. indicated they weren’t vulnerable.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access