Heartbleed web security bug: What you need to know - Action News
Home WebMail Monday, November 11, 2024, 02:33 AM | Calgary | -0.9°C | Regions Advertise Login | Our platform is in maintenance mode. Some URLs may not be available. |
Science

Heartbleed web security bug: What you need to know

Social insurance numbers may have been stolen from 900 Canadians as a result of a security bug in code used by two-thirds of "secure" websites on the internet. More of your sensitive information may be at risk. Here's what you need to know.

The latest updated information about your risk as a result of Heartbleed

Heartbleed is a bug in the code used for making communications secure on more than two-thirds of active websites on the internet, as well as email and chat servers and virtual private networks.

Your Social Insurance Number and other data may have been stolen as a result of a security bug in code used by two-thirds of "secure" websites on the internet including Canada Revenue Agency as well asmobile apps, email and chat servers, VPNclients and hardware devices such as routers. Here's what you need to know.

What is Heartbleed?

Heartbleed is a security bug or programming error in popular versions of OpenSSL, software code that encrypts and protects the privacy of your password, banking information and other sensitive data you type into a "secure" website such as Canada Revenue Agency or Yahoo Mail. Such websites can be identified by the little "lock" icon on your browser or the "s" at the end of "https" before the web address.

Websites secured using encryption with OpenSSL can often by identified by a 'lock' icon on the browser. Due to Heartbleed, your information may not have been secure after all. (Shutterstock)

Heartbleed is not a virus ormalware, but could be exploited by malware and cybercriminals.

The vulnerability allows "anyone on the internet" to read the memory of the system protected by the bug-affected code. That way, they can get the keys needed to decode and read the data, according security researchers at the Finnish firm Codenomicon who discovered it.

The bug, named for the "heartbeat" part of the code that it affects, was independently discovered recently by Codenomicon and Google Security researcher Neel Mehta. The official name for the vulnerability is CVE-2014-0160.

The researchers have set up a website with more detailed information.

What can cybercriminals access by taking advantage of the bug?

User names, passwords, instant messages, emails, business documents and business communications were all accessible during tests by the researchers.

"This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users," they wrote on an website with information about the bug.

What internet services are affected?

According toCodenomicon,OpenSSLis the most popular open-source code used for encryption on the internet. The versions with the bug are used by:

  • More than two-thirds of active websites on the internet.
  • Many mobile apps.
  • Email and chat servers.
  • Virtual private networks, often used to access corporate resources from outside the office.
  • Hardware devices such as routers.

Among those using the affected code was theCanada Revenue Agencywebsite, which confirmed April 14 thatthat sensitivedata,including 900 Social Insurance Numbers, had been stolen as a result of the bug. The public portions of the website wereshut down April 9to 13 deal with the security hole, just weeks before the Canadian tax deadline.

Yahoo, including its Tumblr blogging and Flickr photo sites, was also affected, but said it had patched most services by the afternoon of April 8.

A bigger list of popular sites and whether they are affected by Heartbleed has been compiled by the technology website Mashable.

University of Michigan researchersalso posted a list of the Top 1,000 vulnerable domains as of April 9 at 4 p.m. ET. The only .ca domain was sunnewsnetwork.ca.

And Digital Trends has posted a list of affected mobile apps.

Users of web services should change their passwords, but not until the service they are using notifies them that it has fixed the Heartbleed flaw.

Codenomiconsaid many "large consumer sites" aren't affected because of their "conservative" choice of equipment and software.

"Ironically smaller and more progressive services or those who have upgraded to latest and best encryption will be affected most," Codenomicon says.

Has my private information been stolen as a result of the bug?

For days, there were no confirmed reports of any information stolen as a result of the bug. However, onApril 14, Canada Revenue Agency confirmed the Social Insurance Number theft. The agency isnotifying the people via registered mail.

Late last week, White House intelligence officials denied that theyhad exploited Heartbleed to spy on internet users, contrary to a Bloomberg report based on interviews with two unnamed sources "familiar with the matter."

However, it's possible that the theft of personal information from you or other internet users has gone undetected.

Tests by security researchers showed that eavesdropping via the bug left no trace.

To make matters worse, the bug-affected code has been used by internet services for more than two years.

"I don't think anyone that had been using this technology is ina position to definitively say they weren't compromised," David Chartier, CEO of Codenomicon, told The Associated Press.

Security researchers detected large number ofhackers scanning for the vulnerability across the internet this week.

There has even been one report of possible evidence that cybercriminalswere using this back in November.

Can the bug be fixed?

Yes, but not by you.

A fixed version of OpenSSL was released on Monday, April 7. Websites and other services can be secured by using itor by disabling the affected part of the code. Then it needs to be incorporated into their software and the fixed software needs to be installed. That isn't always easy, especially for certain kinds of devices.

How can I protect myself?

Ari Takanen, chief technology officer for Codenomicon, advises you to wait for an official statement from the internet services you use (indicating that they have fixed the bug) and follow their guidelines.

Typically, that will involve things like changing your password. Thatis something you mayhave to do across many services you use.

However, steps like that are useless until the security hole has been fixed for the affected services.

"Changing before the service is patched could expose the new password," said a spokesperson for Google.

Unfortunately, many internetservices have not been notifying their users directly about whether they are affected and whether they should change their password now or later.

However, recommendations about whether to change your password now for various siteshavebeen posted by Mashable. Some additional recommendations for mobile apps are on a list compiled by Digital Trends.

In the meantime, a number of sites have have been set upwhere you can check if the web services you're using are vulnerable, including this one by LastPass password manager and this one, set up by Italian security researcherFilippo Valsorda.

You might want to stay away fromsites identified as "vulnerable" for now.

However, these sites may not give an accurate result from all sites under all circumstances.

Security experts also recommend as a general rule that you use strong passwords that are different for different internet services and that you change them regularly.

So, specifically, where do I need to change my password? And what services are OK?

As mentioned earlier, the technology websiteMashable has compiled a list of popular sites, with information about whether they were affected and suggestions about whether you need to change your password, and additional information abou affectedt mobile apps has been listed by Digital Trends.

Here's are some otherservices that are not on the list and how they may be affected:

  • Android: According to the Google blogApril 9, Heartbleed only affects Android 4.1.1 andpatching information for Android 4.1.1 is being distributed to Android partners.
  • BlackBerry'sBBMserviceand Secure Work Space email: BlackBerry says it will issue a patch for iOSand Android versions by April 18.
  • Canadian banks: Late April 9, Canadian Bankers' Association saidthere is no need for online banking customers to worry about their private information being stolen.
  • CanadaRevenue Agency: As of April 10, web services were still not available. The agency is expected to provide daily updates at 3 p.m. ET.
  • Devices running VPN: Devices running the following software were affected: Cisco Systems Inc's AnyConnect for iOS and Desktop Collaboration, Tor, OpenVPN and Viscosity from Spark Labs. The developers of those programs have either updated their software or published directions for users on how to mitigate potential attacks.