advertisement

A year after discovery, Heartbleed risk still haunts big companies

BERLIN - Businesses have largely stopped shielding themselves against a Web-security flaw called Heartbleed, providing a growing number of attackers with an easy target, according to security company Venafi.

A year after the vulnerability was made public, 74 percent of more than 1,600 Forbes Global 2000 companies examined haven't fixed their servers and networks completely, said Kevin Bocek, the Salt Lake City, Utah-based company's vice president for security strategy. That's a small improvement from the 76 percent recorded in August, he said.

"You'd think that bigger businesses have got this covered," because most of them have dedicated cybersecurity units, he said. "But as we look at large banks, telcos, manufacturers, they've got much more complex computer systems and they just didn't get around to fixing all their servers."

Heartbleed - a hole in a widely used data-protection technology that existed for two years before the public was alerted - gave hackers the ability to steal secret keys used to encrypt user names, passwords and other information. It sent companies and security researches rushing to patch computer networks.

The fading response to the discovery shows how companies cut corners in responding to an expanding arsenal of cyberweaponry, despite a highly publicized hack into Community Health Systems in which 4.5 million health records were stolen last year.

While most companies have replaced older, vulnerable authentication certificates using the OpenSSL encryption software, many new ones were generated using the same keys, Bocek said. That's bad because those keys can be derived from the old certificates - a procedure that takes hackers about five minutes to complete - allowing attackers to decipher incoming traffic.

Computer administrators have also failed in many cases to revoke the old security certificates, keeping an avenue open for criminals to impersonate their companies to try and "phish" more data from employees and customers.

Attackers looking to steal user data such as passwords are increasingly seeking to obtain certificates, which let criminals pretend to be the legitimate website operators, Bocek said. Last month, Google detected unauthorized certificates for several of its domains. They'd been issued through company based in Egypt that wasn't supposed to have the right to hand them out.

On mobile devices, the security situation is worse still because most applications don't verify at all whether the digital seal is authentic or not, Bocek said.

'Heartbleed' bug causes major security headache

What you need to know about the Heartbleed bug

Heartbleed bug causes major security headache

eBay asks users to change password after breach

Hackers shake confidence in free software idealism of the 1980s

Article Comments
Guidelines: Keep it civil and on topic; no profanity, vulgarity, slurs or personal attacks. People who harass others or joke about tragedies will be blocked. If a comment violates these standards or our terms of service, click the "flag" link in the lower-right corner of the comment box. To find our more, read our FAQ.