{"id":3172,"date":"2014-04-10T07:48:37","date_gmt":"2014-04-10T11:48:37","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3172"},"modified":"2020-02-26T18:58:25","modified_gmt":"2020-02-26T14:58:25","slug":"heartbleed-vulnerability-may-compromise-your-security-on-thousands-of-sites","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/heartbleed-vulnerability-may-compromise-your-security-on-thousands-of-sites\/3172\/","title":{"rendered":"&#8220;Heartbleed&#8221; Vulnerability may compromise your security on thousands of sites"},"content":{"rendered":"<p><strong>UPDATE<\/strong>:<em> A previous version of this article stated \u2013 citing a list on Github \u2013 that users on a site called HideMyAss were affected by Heartbleed. A spokesperson from that site reached out to us claiming that their users are not affected, and we removed them from the list of affected sites accordingly.<\/em><br>\n<strong>UPDATE #2<\/strong>: <em>The post is updated with the <a href=\"#b2\" target=\"_blank\" rel=\"noopener\">list of affected services<\/a> which officially recommend to change users\u2019 passwords.<\/em><\/p>\n<p><span style=\"font-size: 14px; line-height: 1.5em;\">You know a security vulnerability is a serious one when NPR\u2019s David Green leads into the 8 AM hour of Morning Edition talking about it. Such was the case yesterday morning, with the story of a serious encryption flaw \u2013 dubbed Heartbleed \u2013 in OpenSSL, perhaps the most widely deployed encryption library on the Internet. If you\u2019re a bit confused about what this all means, don\u2019t worry, I am going to attempt to unpack the whole story in the next 500 words or so.<\/span><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111201\/heart-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4432\" alt=\"heart\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111201\/heart-1.jpg\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>When you establish an <a href=\"https:\/\/www.kaspersky.com\/blog\/digital-certificates-httpss\/\" target=\"_blank\" rel=\"noopener nofollow\">encrypted connection<\/a> to a website, whether it\u2019s Google, Facebook, or your bank\u2019s online branch, the data is encrypted using the SSL\/TLS protocol. Many popular web servers utilize the open-source OpenSSL library to do this job for them. Earlier this week<a href=\"https:\/\/threatpost.com\/openssl-fixes-tls-vulnerability\/105300\" target=\"_blank\" rel=\"noopener nofollow\">, the maintainers of OpenSSL released a fix for a serious bug<\/a> in the implementation of TLS feature called \u201cHeartbeat,\u201d which could potentially reveal up to 64 kB of server memory to an attacker.<\/p>\n<p>In other words, the flaw could have enabled anyone on the Internet to read the memory of a machine that\u2019s protected by a vulnerable version of the library. In the worst-case scenario, this small block of memory may contain something sensitive \u2013 user names, passwords, or even the private key which is used by the server to keep your connection encrypted. In addition, exploiting Heartbleed leaves no traces, so there is no definite way to tell if a server was hacked and what kind of data was stolen.<\/p>\n<p>Here\u2019s the good news: OpenSSL fixed the bug. Here\u2019s the bad news: there is no way to guarantee that those sites and services affected by Heartbleed are implementing the patch that mitigates it. More bad news: apparently the bug is pretty easy to exploit and may have existed for as long as two years. It means that the security certificates of many popular sites may have been stolen, as well as sensitive user data, including passwords.<\/p>\n<h2>The action plan for the user<\/h2>\n<p><a name=\"b2\"><\/a><b>Update:<\/b><a href=\"http:\/\/mashable.com\/2014\/04\/09\/heartbleed-bug-websites-affected\/\" target=\"_blank\" rel=\"noopener nofollow\">Mashable collected the list<\/a> of official PR responses from affected web services. To save your time on table reading and certificate checking (more on this below), you can simply <strong>change your password<\/strong> on all these sites: Facebook, Instagram, Pinterest, Tumblr, Yahoo, AWS, Box, Dropbox, Github, IFFT, Minecraft, OKCupid, SoundCloud, Wunderlist. Use a <strong>unique password<\/strong> for each site!<\/p>\n<ul>\n<li><b>Check if your favorite site <span style=\"text-decoration: underline;\">was<\/span> vulnerable<\/b>. There are online tools to <a href=\"http:\/\/filippo.io\/Heartbleed\" target=\"_blank\" rel=\"noopener nofollow\">check the presence of the vulnerability<\/a>, but you also need to know if it was present before. Luckily, there is a <a href=\"https:\/\/github.com\/musalbas\/heartbleed-masstest\/blob\/94cd9b6426311f0d20539e696496ed3d7bdd2a94\/top1000.txt\" target=\"_blank\" rel=\"noopener nofollow\">long list of popular websites<\/a> that were checked against the vulnerability. Good news: PayPal and Google are unaffected. Bad news: Yahoo, Facebook, Flickr, Duckduckgo, LastPass, Redtube, OkCupid, 500px and many others was vulnerable. Get ready to act if you have an account on those vulnerable sites;<\/li>\n<li><b>Check if the site is vulnerable now<\/b>. There is a <a href=\"http:\/\/filippo.io\/Heartbleed\" target=\"_blank\" rel=\"noopener nofollow\">simple tool<\/a> for that.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111200\/heartbleed1-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4435\" alt=\"heartbleed1\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111200\/heartbleed1-1.png\" width=\"400\" height=\"203\"><\/a><\/p>\n<ul>\n<li>When site owners fix the bug, they\u2019ll need to consider re-issuing site certificates as well. So get ready to <b>monitor server certificates<\/b> and <b>make sure you\u2019re using a new one<\/b> (issued on April 8th or later). To do this, enable the certificate revocation check in your browser.\u00a0 Here is the sample from Google Chrome settings:<\/li>\n<\/ul>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111159\/heartbleed2-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4434\" alt=\"heartbleed2\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111159\/heartbleed2-1.png\" width=\"427\" height=\"173\"><\/a><\/p>\n<ul>\n<li>This will prevent your browser from using old certificates. To check the certificate issue date manually, click the green lock in the address bar and click the \u201cinformation\u201d link on the \u201cConnection\u201d tab:<\/li>\n<\/ul>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111158\/heartbleed3-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4433\" alt=\"heartbleed3\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111158\/heartbleed3-1.png\" width=\"346\" height=\"353\"><\/a><\/p>\n<ul>\n<li>The most important step \u2013 when the server is patched and certificate is updated, is to\u00a0<b>change your password immediately<\/b>. Use this opportunity to revise your password policy and start using <a href=\"https:\/\/www.kaspersky.com\/blog\/21st-century-passwords\/\" target=\"_blank\" rel=\"noopener nofollow\">simple to remember yet strong passwords<\/a>. You can check, if your new password is good using our <a href=\"https:\/\/www.kaspersky.com\/blog\/password-check\/\" target=\"_blank\" rel=\"noopener nofollow\">Password Checker<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>UPDATE: A previous version of this article stated \u2013 citing a list on Github \u2013 that users on a site called HideMyAss were affected by Heartbleed. A spokesperson from that<\/p>\n","protected":false},"author":42,"featured_media":3173,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,9],"tags":[305,261,558,543,559,187,97,560],"class_list":{"0":"post-3172","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-tips","9":"tag-account-security","10":"tag-encryption","11":"tag-heartbleed","12":"tag-news-2","13":"tag-openssl","14":"tag-passwords","15":"tag-security-2","16":"tag-ssl"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/heartbleed-vulnerability-may-compromise-your-security-on-thousands-of-sites\/3172\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/account-security\/","name":"account security"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3172"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3172\/revisions"}],"predecessor-version":[{"id":15752,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3172\/revisions\/15752"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3173"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}