Major security flaw found - Public urged to reset all passwords

Neki

Molten Core Raider
2,726
397
BBC News - Heartbleed Bug: Public urged to reset all passwords

Heartbleed Bug: Public urged to reset all passwords

Several tech firms are urging people to change all their passwords after the discovery of a major security flaw.

The Yahoo blogging platform Tumblr has advised the public to "change your passwords everywhere - especially your high-security services like email, file storage and banking".

Security advisers have given similar warnings about the Heartbleed Bug.

It follows news that a product used to safeguard data could be compromised to allow eavesdropping.

OpenSSL is a popular cryptographic library used to digitally scramble sensitive data as it passes to and from computer servers so that only the service provider and the intended recipients can make sense of it.

If an organisation employs OpenSSL, users see a padlock icon in their web browser - although this can also be triggered by rival products.

Those affected include Canada's tax collecting agency, which halted online services "to safeguard the integrity of the information we hold".

Google Security and Codenomicon - a Finnish security company - revealed on Monday that a flaw had existed in OpenSSL for more than two years that could be used to expose the secret keys that identify service providers employing the code.

They said that if attackers made copies of these keys they could steal the names and passwords of people using the services, as well as take copies of their data and set up spoof sites that would appear legitimate because they used the stolen credentials.

It is not known whether the exploit had been used before the revelation, since doing so would not leave a trail - unless the hackers published their haul online.

"If people have logged into a service during the window of vulnerability then there is a chance that the password is already harvested," said Ari Takanen, Codenomicon's chief technology officer.

"In that sense it's a good idea to change the passwords on all the updated web portals."

Other security experts have been shocked by the revelation

"Catastrophic is the right word. On the scale of one to 10, this is an 11," blogged Bruce Schneier.

The BBC understands that Google warned a select number of organisations about the issue before making it public, so they could update their equipment to a new version of OpenSSL released at the start of the week.

However, it appears that Yahoo was not included on this list and tech site Cnet has reported that some people were able to obtain usernames and passwords from the company before it was able to apply the fix.

"Our team has successfully made the appropriate corrections across the main Yahoo properties - Yahoo Homepage, Yahoo Search, Yahoo Mail, Yahoo Finance, Yahoo Sports, Yahoo Food, Yahoo Tech, Flickr and Tumblr - and we are working to implement the fix across the rest of our sites right now," said a spokeswoman for the company.

NCC Group - a cybersecurity company that advises many members of the FTSE 250 - described the situation as "grave".

"The level of knowledge now needed to exploit this vulnerability is substantially less than it was 36 hours ago," the company's associate director Ollie Whitehouse told the BBC.

"Someone with a moderate level of technical skills running their own scripts - the Raspberry Pi generation - would probably be able to launch attacks successfully and gain sensitive information.

"As long as service providers have patched their software it would now be a prudent step for the public to update their passwords."

Several security firms and independent developers have published online tests to help the public discover if the services are still exposed.

However, there is no simple way to find out if they were vulnerable before.

Organisations that used Microsoft's Internet Information Services (IIS) web server software would not have been affected.

But Codenomicon has noted that more than 66% of the net's active sites rely on the open source alternatives Apache and Nginx, which do use OpenSSL.

Even so, some of these sites would have also employed a feature called "perfect forward secrecy" that would have limited the number of their communications that could have been hacked.

A researcher at the University of Cambridge Computer Laboratory said it would be an overreaction to say everyone should drop what they are doing to reset all their passwords, but that those concerned should still act.

"I think there is a low to medium risk that any given password has been compromised," said Dr Steven Murdoch.

"It's not the same as previous breaches where there's been confirmed password lists posted to the internet. It's not as urgent as that.

"But changing your password is very easy. So it's not a bad idea but it's not something people have to rush out to do unless the service recommends you do so."
/resets Rerolled password
 

McCheese

SW: Sean, CW: Crone, GW: Wizardhawk
6,889
4,248
I'm not very tech savvy. Does this mean Rio 2 stole my passwords?
 

Falstaff

Ahn'Qiraj Raider
8,311
3,166
The best part about this is that Google decided not to warn Yahoo about this before it went public.
 

Tuco

I got Tuco'd!
<Gold Donor>
45,409
73,480
Seems like a weird situation. I don't know which websites were vulnerable, I don't know which websites are still vulnerable, and I can only assume that tons more people are exploiting the vulnerability where they can so resetting my password on them would only expose me more.
 

Lusiphur

Peasant
595
47
I work in this field. Don't reset any password on a compromised site until the site confirms it has patched.
 

Noodleface

A Mod Real Quick
37,961
14,508
cool, this is exactly what I need (and hopefully doesn't give false positives or negatives).

Do people still recommend using KeePass type programs? which one is the best?
I use keepass on my home PC. I'm pretty strict with security on my own PC's so I'm not too worried about anyone gaining access to it.

I've thought about using the mobile application but I fear that would be disastrous if anyone got ahold of my phone.
 

Falstaff

Ahn'Qiraj Raider
8,311
3,166
I have two factor authentication on every website I care about, meaning my gmail, twitter, and bank/credit cards. If someone steals my rerolled password, okay cool.

Only thing I would be concerned about is Amazon but I get an email notification anytime my Amazon card is used so I'd know something was fishy right away.
 

Selix

Lord Nagafen Raider
2,149
4
I've been using lastpast and before that keepass for a year now. Amazingly easy to use and I think laatpass had monitors in place to see this if it had happened to them. I feel fairly safe though there are a few passwords I'm guilty of still using to often.
 

Obtenor_sl

shitlord
483
0
At this rate I should just reset all my passwords every week, and my banks should just reissue my cards every month.
 

Remit_sl

shitlord
521
-1
It's been in the OpenSSL library since 2011, so anything that used that library up until the patch released on the 7th was vulnerable.
Correct, anything that used a version prior to 2011 or the current 1.0.1g is fine though. Just the one version was vulnerable (1.0.1c I think)