Tags: computer | security | Heartbleed | hack

Heartbleed Hack Still a Threat to Big Companies Six Months Later

Wednesday, 27 Aug 2014 07:08 AM


Hundreds of thousands of corporate computer servers, routers and other Internet devices worldwide remain vulnerable to the Heartbleed Web-security flaw nearly six months after its existence was disclosed, security researchers say.

More than half of the Forbes Global 2000 listing of the world’s most profitable companies have servers that are still not fully protected, according to the security company Venafi Inc. which electronically probed them Aug. 22.

“We expect that the most sophisticated attackers will use this at the time of their liking,” Kevin Bocek, vice president for security strategy and threat intelligence at the Sandy, Utah-based company, said.

He declined to name any companies found to be vulnerable, though said they were in the health care, retail, banking and other sectors. The biggest public company known to be hacked through Heartbleed was Community Health Systems Inc., which disclosed Aug. 18 it had been attacked in April and June.

Separately, Errata Security, a consulting company based in Atlanta, Georgia, scanned publicly available devices on the Internet on June 20 and found as many as 300,000 routers, servers and other Internet devices were still vulnerable.

The lag in responding to one of the most widespread Internet vulnerabilities ever uncovered means hackers can still intercept user names, passwords and other sensitive data, just like they did by stealing 4.5 million patient records from Community Health earlier this year.

Community Health

Chinese hackers exploited Community Health’s Heartbleed vulnerability more than a week after the security hole was publicized, said a person involved in the investigation. The timetable illustrates how attackers often move faster than corporate security teams to exploit flaws once they become known.

Community Health was required to notify patients and regulators and said in an Aug. 18 regulatory filing that it “completed eradication of the malware from its systems and finalized the implementation of other remediation efforts that are designed to protect against future intrusions of this type.” The company didn’t say whether the breach occurred due to Heartbleed.

In the wake of the Heartbleed disclosure, much attention was focused on concerns that websites might be hacked. It may be that devices companies depend on to connect to customers, medical patients and users are most vulnerable to the flaw, Kevin Hamlen, an associate professor at the University of Texas in Dallas, said in a phone interview.

Programming Mistake

Heartbleed is a programming mistake in OpenSSL, which is used by companies to secure traffic flowing between servers and computers. SSL refers to an encryption protocol known as Secure Sockets Layer and its use is indicated by a closed padlock appearing on browsers next to a website’s address.

Venafi found 1,219 companies on the Forbes Global 2000 had a combined 448,000 servers that weren’t fully secured from Heartbleed. The company had sent automated browser requests to the firms to look for hardware and software vulnerabilities and recorded the publicly available information that was returned.

“Definitely expect more” companies to find out they’ve been infiltrated through the flaw, said Jeff Horne, who investigates data breaches as vice president of research and development and chief architect at Accuvant Inc., a Denver, Colorado-based security firm. “It takes people forever to patch.”

Heartbleed, which existed for two years before the public was alerted to the flaw April 7, lets hackers steal the secret keys protecting user names, passwords and other digital data. With keys in hand, hackers can infiltrate deeper into a company’s network to obtain other data.

No Disclosure

Researchers who discovered Heartbleed warned at the time it might have affected as many as two-thirds of the world’s almost 1 billion active websites, a claim that hasn’t been borne out.

“Underneath the tip of that iceberg every web-facing server that used OpenSSL for encrypted communication was vulnerable,” Hamlen said.

The extent of damage may never be known as companies are under no obligation to report breaches unless they involve protected data, such as patient records, credit-card numbers and other personal information, or unless a public company determines that its shareholders need to know about an attack.

Companies rushed to patch their computers when the flaw became public, however their uneven responses gave hackers a window of opportunity. The flaw got its name because hackers use it to exploit encrypted computer connections in which data packets known as heartbeats are exchanged.

‘Vary Widely’

“How a company responds and reacts to vulnerabilities can vary wildly,” Raj Samani, chief technology officer for Europe, the Middle East and Africa for McAfee Inc., said.

Community Health, based in Franklin, Tennessee, said in a disclosure that the attacks on its networks occurred in April and June, and a person involved in investigating the breach said it was carried out by exploiting Heartbleed. The person discussed the internal investigation only on the condition of anonymity.

The hackers exploited the Heartbleed flaw in a virtual private networking device made by Juniper Networks Inc. and used by Community Health in order to steal credentials of company employees, said David Kennedy, founder of TrustedSec LLC, a Cleveland-based security consulting company. The claim couldn’t be independently verified. Kennedy was first to report on his company’s website Aug. 19 that Heartbleed was used in the attack and said he was informed by three people close to the investigation.

Juniper Patch

Tomi Galin, a spokeswoman for Community Health, declined to comment on the role of Heartbleed or the Juniper device in the attack. She said in an e-mail that although patient identification data was stolen, the hackers didn’t obtain medical or financial information. She didn’t answer questions about when Community Health received a patch from Juniper or when the company applied the patch.

Lookingglass Cyber Solutions Inc. passively identified signals coming from Community Health’s public-facing routers and websites, which indicated the company has computers infected by different malware as far back as January, said Chris Coleman, chief executive officer of Lookingglass, which is based in Baltimore, Maryland.

Conficker Worm

Coleman equated it to seeing smoke coming from a house on fire, even though there’s no way to know for sure how strong the flames are raging inside. Some of the signals indicated presence of the Conficker worm, which was first discovered in 2008, suggesting the company’s systems are either unable to be patched or have simply been ignored.

“If you haven’t patched a vulnerability that has been open since 2008, it wouldn’t surprise me that they haven’t patched a vulnerability since April,” Coleman said in a phone interview. Community Health spokesman Galin didn’t respond to e-mail and telephone requests for comment on Coleman’s findings.

Juniper was among many device manufacturers that had to react to Heartbleed. It issued patches for Heartbleed on its devices on April 8, April 9 and April 11, said Danielle Hamel, spokeswoman for the Sunnyvale, California-based company.

“Juniper is committed to the security and assurance of its products,” Hamel said in an e-mail. “When we learned earlier this year about vulnerabilities in OpenSSL, we reacted with speed and transparency and delivered a remediation for effected affected products within a day.”

Vulnerable Products

Juniper said it discovered and fixed nearly a dozen vulnerable products, including virtual private networking software for sending encrypted communications, the Junos operating system for managing networks, and Junos Pulse for enabling workers to log into sensitive systems from their smartphones.

Community Health also buys from another device manufacturer, Cisco Systems Inc., which competes with Juniper. Cisco issued security advisories for its customers between April 8 and June 6, Nigel Glennie, spokesman for the San Jose, California-based company, said in an e-mail.

Cisco said it discovered and fixed 77 products that had been vulnerable, including its TelePresence video-calling service, Internet Protocol phones and security-management software.

“There’s definitely a chance that other organizations during the window in which Heartbleed had not been patched were exploited,” Nick Sullivan, an engineer with the network security company CloudFlare Inc. in San Francisco, said in a phone interview. “It was a hectic time.”

© Copyright 2015 Bloomberg News. All rights reserved.

Around the Web
Join the Newsmax Community
Please review Community Guidelines before posting a comment.
>> Register to share your comments with the community.
>> Login if you are already a member.
blog comments powered by Disqus
Zip Code:
Privacy: We never share your email.
Hot Topics
Follow Newsmax
Like us
on Facebook
Follow us
on Twitter
Add us
on Google Plus
Around the Web
You May Also Like

UK Tycoon Warns of Major Recession to Be Remembered for '100 Years'

Friday, 30 Jan 2015 13:08 PM

U.K. hedge fund heavyweight Crispin Odey, founder of Odey Asset Management, predicts the current global economic weaknes . . .

Reuters Poll: Oil Price Will Average Less in 2015 Than During Financial Crisis

Friday, 30 Jan 2015 11:55 AM

Crude oil will likely continue falling before posting only a mild recovery in the second half of this year, a Reuters su . . .

Worker Pay in US Rose at a Slower Pace in Fourth Quarter

Friday, 30 Jan 2015 10:30 AM

Wages and salaries in the U.S. rose at a slower pace in the fourth quarter, indicating workers have limited success barg . . .

Most Commented
Top Stories

Newsmax, Moneynews, and Independent. American. are registered trademarks of Newsmax Media, Inc. Newsmax TV, NewsmaxWorld, NewsmaxHealth, are trademarks of Newsmax Media, Inc.

America's News Page
©  Newsmax Media, Inc.
All Rights Reserved