- CyberCrime Center
April 15, 2014
If you thought you heard all the news there was about risks associated with Heartbleed — uh-uh. There’s more. But only hackers and masochists will be pleased to hear it. (On the very remote chance you haven’t heard about Heartbleed, the flaw found OpenSSL, which helps encrypt information on the Internet, please see our blog Heartbleed Part II.)
Here’s the latest. According to a story by Nicole Perlroth and Quentin Hardy in The New York Times, Heartbleed could cause damage to the guts of the Internet and the wide variety of devices that connect to it. (The following has been edited to fit our format.)
Cisco Systems, the dominant provider of gear to move traffic through the Internet, said its big routers and servers, as well as its online servers …were not affected. If they had been, that would have had a significant impact on virtually every major company that connects to the Internet.
Certain products the company makes were affected, it said — some kinds of phones that connect to the Internet, a kind of server that helps people conduct online meetings, and another kind of device used for office communications. Cisco also posted a list of products it had examined for the vulnerability, which it was updating as it continued inspecting its equipment.
Juniper Networks, also said its main products were not affected. The only problem it found was in a kind of device for creating private communications on the Internet.
“Besides [the] one product, the exposure for our customers is minimal, if any,” said Michael Busselen, vice president of corporate communications at Juniper.
Chuck Mulloy, a spokesman for Intel, said his company had been looking through its products for vulnerabilities for several days and so far had found nothing. He said, however, that the search was not yet done.
Qualcomm, a maker of mobile technology, said it was still checking its products….
For most people, the web — with sites like Facebook and Google — is the most visible part of the Internet. But hardware like home routers and printers is also connected to the Internet, and OpenSSL is built into some of this hardware.
“That’s why this is so nasty,” said [security expert] George Kurtz…. “OpenSSL goes far beyond just websites. It’s implemented in email protocols and all kinds of embedded devices.”
Most of the equipment made by Cisco and Juniper was unaffected because the companies did not use OpenSSL for their encryption.
[Other security] experts say personal home routers often incorporate OpenSSL, which could make them vulnerable. But they note that because many home routers are configured to block outside traffic, the risk of a hacker using the Heartbleed bug to lift data like passwords to online banking and email accounts is low. This is particularly so, they said, when there are still thousands of vulnerable websites where this data could be pulled from much more easily.
Nevertheless, Mr. Kurtz said, users would be wise to check with their home router manufacturers to upgrade their devices if they want to be absolutely secure.
Security researchers say that while hackers have been posting lists of vulnerable websites, there does not appear to have been an increase in black market sales of sensitive data, like passwords.
Security experts say that upgrading and cleaning up those systems, if they are affected, could take years.
“It’s one thing to get all of these servers at Yahoo, Google and everyone else fixed, but it’s a whole other thing to get these embedded devices fixed up,” Mr. Kurtz said. “I don’t see them getting updated any time soon.”
Here’s hoping there’s no need for a Heartbleed, Part IV.
ThreatMetrix® builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.
ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix® Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.
The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.
For more information, visit www.threatmetrix.com or call 1-408-200-5755.
Posted by Dan Rampe
Tags: Account Takeover, Account Takeover Fraud, Bank Fraud, Building Trust on the Internet, CNP fraud, Context-Based Authentication, Cookieless Device Identification, Cookies, Credit Card Fraud, Cyber attacks, Data Breach, Device Detection, Device Fingerprint, Device Fingerprinting, Device ID, Device Identification, Fraud Prevention, Hacking, Heartbleed, Identity Spoofing, Identity theft, Malware, Malware Protection, Man-in-the-Browser Detection, MitB, Mobile fraud, Online Fraud, Phishing, Phishing Detection, PII, ThreatMetrix, ThreatMetrix Cybercrime Index, ThreatMetrix Global Trust Intelligence Network, ThreatMetrix Web Fraud Map, TrustDefender Cybercrime Protection Platform, Web Fraud
24 Apr 2015
23 Apr 2015
22 Apr 2015