{"id":2006,"date":"2014-06-10T18:24:46","date_gmt":"2014-06-10T18:24:46","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2006"},"modified":"2020-02-27T03:44:15","modified_gmt":"2020-02-26T16:44:15","slug":"cardiac-exsanguination-a-heartbleed-damage-round-up","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/cardiac-exsanguination-a-heartbleed-damage-round-up\/2006\/","title":{"rendered":"Cardiac Exsanguination: a Heartbleed damage round-up"},"content":{"rendered":"<p>It\u2019s been two months since a critical vulnerability in OpenSSL cryptography library, codenamed Heartbleed, had been disclosed publicly. This bug is most likely going to be the most important vulnerability of 2014, or even of the entire decade, overshadowing a priori most of the other mishaps that are yet to happen. Unless any of them affects the entire Web. And that\u2019s the case with Heartbleed actually: It was a real \u201cred alert\u201d for the Internet. Security expert Bruce Schneier <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2014\/04\/heartbleed.html\" target=\"_blank\" rel=\"noopener nofollow\">set it at 11 at the threat scale of 1 to 10<\/a>. Some experts called Heartbleed the greatest Internet disaster ever.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>Now, what about factual damage? Was there any? The short answer is \u201cyes, but\u2026\u201d, and the longer one would be quite long indeed.<\/p>\n<p>On April 7th Heartbleed went public, with a lot of publications on <a href=\"https:\/\/business.kaspersky.com\/addressing-the-heartbleed-panic-advice-for-small-business-owners-2\/\" target=\"_blank\" rel=\"noopener nofollow\">who is affected<\/a>, how to <a href=\"https:\/\/business.kaspersky.com\/the-heartbleed-bug-averting-a-doomsday\/\" target=\"_blank\" rel=\"noopener nofollow\">avert the doomsday<\/a>, and what are the <a href=\"https:\/\/business.kaspersky.com\/the-heartbleed-scare-the-quest-of-changing-passwords\" target=\"_blank\" rel=\"noopener nofollow\">primary consequences<\/a>.<\/p>\n<p>Now the public attention to Heartbleed is basically fading, although recent disclosure of six more bugs in OpenSSL <a href=\"https:\/\/business.kaspersky.com\/new-openssl-bugs-are-found-in-numbers-bad-or-good\/\" target=\"_blank\" rel=\"noopener nofollow\">forced us all to refresh our memory<\/a>. But the problem itself hasn\u2019t gone away entirely, and it would be fair to say it\u2019s developing still.<\/p>\n<p>So far there are only a few known (i.e., openly publicized) cases of real exploitation of Hearbleed bug. For instance, some Yahoo passwords leaked, <a href=\"http:\/\/grahamcluley.com\/2014\/04\/heartbleed-bug-leak-yahoo-password\/\" target=\"_blank\" rel=\"noopener nofollow\">presumably due to the Heartbleed on April 8th<\/a>, the next day after The Disclosure.<\/p>\n<p>J. Alex Halderman, an assistant professor of electrical engineering and computer science with University of Michigan <a href=\"http:\/\/www.bloomberg.com\/news\/2014-04-14\/hacker-from-china-wastes-little-time-in-exploiting-heartbleed.html\" target=\"_blank\" rel=\"noopener nofollow\">reported <\/a>that someone from China attempted to attack the University server via Heartbleed hole, also on April 8th. The \u201cserver\u201d in fact appeared to be a honeypot, crafted specifically to catch attackers. Within a following week Halderman and his team detected over 40 attempts to exploit Heartbleed, half of them originating from Chinese Republic.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>Was there any real damage inflicted by Heartbleed? The short answer is yes.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fv2zX&amp;text=Was+there+any+real+damage+inflicted+by+Heartbleed%3F+The+short+answer+is+yes.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>On April 11 (four days after The Disclosure) CloudFlare challenged security experts to exploit Heartbleed in order to steal SSL keys from a server. It was done successfully twice. One of these researchers \u2013 Fedor Indutny \u2013 has written a Node.js script which has generated over 2.5 million requests for data over the span of the challenge. Indutny eventually posted some details on his work <a href=\"https:\/\/blog.indutny.com\/9.heartbleed\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/06\/06020019\/800_1-2-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2008\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/06\/06020019\/800_1-2-1.png\" alt=\"800_1-2\" width=\"800\" height=\"530\"><\/a><\/p>\n<p>A few days after the Heartbleed disclosure Canada Revenue Agency reported that someone exploited Heartbleed (again) on April 8th, in order to steal Social Insurance Numbers of 900 tax payers \u2013 just in time: CRA eventually <a href=\"http:\/\/www.vancouversun.com\/technology\/Canada+Revenue+Agency+pushes+deadline+after+Heartbleed\/9734773\/story.html\" target=\"_blank\" rel=\"noopener nofollow\">pushed tax deadline to May 5<\/a>.<\/p>\n<p>On April 16 a 19 y.o. student <a href=\"http:\/\/www.bbc.com\/news\/technology-27058143\" target=\"_blank\" rel=\"noopener nofollow\">got apprehended<\/a> and charged with \u201cunauthorized use of a computer\u201d and \u201cmischief in relation to data\u201d. It was the first and, apparently, the only arrest so far related to the bug.<\/p>\n<p>A number of accounts in Mumsnet, a parents-oriented network, got hijacked a few days after The Disclosure: <a href=\"http:\/\/www.mumsnet.com\/features\/mumsnet-and-heartbleed-as-it-happened?utm_source=Twitter&amp;utm_medium=tweet&amp;utm_campaign=daily%2BHeartbleed%2Bas%2Bit%2Bhappened\" target=\"_blank\" rel=\"noopener nofollow\">Heartbleed allowed to expose the owners\u2019 credentials<\/a>. Hacker actually announced him- or herself on the network, claiming that he (or she) wanted to show how serious Heartbleed problem is. Check.<\/p>\n<p>BBC News <a href=\"http:\/\/www.bbc.com\/news\/technology-27203766\" target=\"_blank\" rel=\"noopener nofollow\">reported on April 29 <\/a>that a number of researchers successfully exploited Heartbleed to infiltrate several underground forums used by cybercriminals, those are otherwise next to impossible to penetrate. It\u2019s pretty amusing to see how cyber-miscreants are fed with their own medicine (although there\u2019s little new here). However, they must have patched their dens promptly.<\/p>\n<p>Worse than actually inflicted damage is the potential damage, which is hard or impossible to avert.<\/p>\n<p>For instance immediately after The Disclosure Google reported to patch up its services and claimed that all of the Android versions are immune to Heartbleed \u201c<a href=\"http:\/\/googleonlinesecurity.blogspot.ru\/2014\/04\/google-services-updated-to-address.html\" target=\"_blank\" rel=\"noopener nofollow\">with limited exception of Android 4.1.1<\/a>\u201d that happened to be the most widely used version of Android <a href=\"http:\/\/en.wikipedia.org\/wiki\/Android_(operating_system)#Platform_usage\" target=\"_blank\" rel=\"noopener nofollow\">(29% as of June, 1st<\/a>, <a href=\"http:\/\/www.businessinsider.com\/heartbleed-bug-android-jelly-bean-2014-4\" target=\"_blank\" rel=\"noopener nofollow\">about 34% in mid-April<\/a>). Potentially it can be patched against the vulnerability, but it\u2019s unclear, how many devices have been or will be updated.<\/p>\n<p>Worse even is the amount of smart devices affected by the bug: <a href=\"http:\/\/www.wired.com\/2014\/04\/heartbleed_embedded\/%20\" target=\"_blank\" rel=\"noopener nofollow\">Wired<\/a> and some others report that home routers and corporate firewalls, printers, videocameras, thermostats, home management gadgets, and even baby monitors are all vulnerable, and the question is whether patching is possible and would it be applied \u2013 automatically or manually.<\/p>\n<p>Siemens industrial control systems controlling heavy machinery in power plants and waste water facilities contained the <a href=\"http:\/\/www.infosecurity-magazine.com\/view\/38046\/siemens-among-industrial-control-systems-vulnerable-to-heartbleed-flaw\" target=\"_blank\" rel=\"noopener nofollow\">bug too<\/a>, but Siemens reported <a href=\"http:\/\/www.pcworld.com\/article\/2149340\/siemens-patches-heartbleed-in-popular-scada-system.html\" target=\"_blank\" rel=\"noopener nofollow\">patching in by the end of April<\/a>.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>Worse than actual inflicted damage is the potential damage, which is hard or impossible to avert.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fv2zX&amp;text=Worse+than+actual+inflicted+damage+is+the+potential+damage%2C+which+is+hard+or+impossible+to+avert.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>At the end of May, a Portuguese security researcher Luis Grangeia described the way Heartbleed vulnerability can be used over Wi-Fi. According to Grangeia, who even posted proof of concept, the new attack method allows the pulling of data from enterprise routers using \u201c<a href=\"http:\/\/www.theverge.com\/2014\/5\/29\/5762496\/new-heartbleed-attack-targets-android-devices-and-routers-over-wi-fi\" target=\"_blank\" rel=\"noopener nofollow\">the same Heartbleed procedure over Wi-Fi instead of the open Web<\/a>\u201d or from Android devices using a malicious router.<\/p>\n<p>So, we can see, the story is far from over. Even though most servers on the Web seem to be patched, <a href=\"http:\/\/www.theregister.co.uk\/2014\/05\/20\/heartbleed_still_prevalent\/\" target=\"_blank\" rel=\"noopener nofollow\">according to some estimates<\/a> there are still hundreds of thousands servers prone to \u201ccardiac exsanguination\u201d.<\/p>\n<p>It is unclear whether Heartbleed had been really exploited before The Disclosure. There is no positive confirmations for that, but there is also no way it can be denied beyond any doubt. Quite unsurprisingly, a lot of rumors whirled up about possible NSA knowledge and exploitation of the Heartbleed at least two years prior to its public disclosure. NSA denied it, of course, but a rumor is a persisting thing, especially in such cases as this.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/06\/06020018\/800_2-2-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2009\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/06\/06020018\/800_2-2-1.png\" alt=\"800_2-2\" width=\"800\" height=\"571\"><\/a><\/p>\n<p>And the Heartbleed itself will persist too, at least for some time.<\/p>\n<p>Still there is at least one positive outcome from both Heartbleed and the later (and less-fancy) disclosures made by OpenSSL Project: They have drawn <em>a lot<\/em> of attention from general public and tech experts to passwords and security overall.<\/p>\n<p>Ensuring security on the Web is something that requires active efforts from all parties concerned. Rarely would anyone doubt this verity, but from time to time it bears reminding, even with not-so-subtle ones as Heartbleed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?<\/p>\n","protected":false},"author":209,"featured_media":15837,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[93,189,588],"class_list":{"0":"post-2006","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybercriminals","10":"tag-data-security","11":"tag-heartbleed"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cardiac-exsanguination-a-heartbleed-damage-round-up\/2006\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cardiac-exsanguination-a-heartbleed-damage-round-up\/2006\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cardiac-exsanguination-a-heartbleed-damage-round-up\/2006\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/cybercriminals\/","name":"cybercriminals"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=2006"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2006\/revisions"}],"predecessor-version":[{"id":26356,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2006\/revisions\/26356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15837"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=2006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=2006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=2006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}