Study concludes 'Heartbleed' flaw was unknown before disclosure

Network traffic records show no signs attackers were looking for vulnerable servers before Heartbleed's disclosure

One of the most serious software flaws to affect the Internet, nicknamed "Heartbleed," was likely unknown before it was publicly disclosed, according to new research.

The finding puts to rest fears that government spying agencies may have been exploiting the flaw for surveillance activities.

Widespread attacks using Heartbleed only began about a day after information about it became public, according to the paper, published by researchers at several U.S. universities.

"We find no evidence of exploitation prior to the vulnerability's public disclosure, but we detect subsequent exploit attempts from almost 700 sources beginning less than 24 hours after disclosure," they wrote.

Heartbleed was a flaw in older versions of OpenSSL, a widely used cryptographic library that encrypts data traffic between a client and a server. In some cases, Heartbleed leaked memory from a server, potentially exposing login credentials, cryptographic keys and other private data.

Its disclosure on April 7 set off a scramble to patch. Upwards of 55 percent of the top one million websites ranked by traffic by Alexa were affected, many of which were quickly patched.

To figure out if attacks had been executed against OpenSSL prior to disclosure of the flaw, the researchers analyzed network traffic collected by passive traps at Lawrence Berkeley National Laboratory, the National Energy Research Scientific Computing Center and a honeypot on Amazon's EC2 network.

The networks collectively had full packet traces available from around November 2013 through April. No tell-tale signs that attackers were trying to exploit Heartbleed were found, although such scanning for vulnerable servers "could have occurred during other time periods," they cautioned.

The first attacks were detected 21 hours and 29 minutes after Heartbleed became public from a host at the University of Latvia, they wrote. Soon after, the attacks came fast and furious.

Two days after Heartbleed was disclosed, about 11 percent of the top 1 million sites ranked by Alexa were still vulnerable. The top 500 sites, however, had all patched within that same period.

Three weeks after disclosure, the researchers began contacting the operators of more than 200,000 hosts that were still vulnerable, a laborious undertaking. They did that by extracting the "abuse" email contacts from Whois records.

"When we notified network operators of the unpatched systems in their address space, the rate of patching increased by 47 percent," the paper read. "Many of the operators reported they had intended to patch, but that they had missed the system we detected."

The success of that effort challenges the belief that mass notifications of vulnerabilities would be ineffective or too difficult, they wrote.

"Future work is needed to understand what factor influence the effectiveness of mass notifications and determine how best to perform them," they wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags no companysecurity

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Essentials

Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >

Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >

Mobile

Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >

Exec

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >

Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?