SHARE
Facebook X Pinterest WhatsApp

Heartbleed Spam and OpenSSL Security Woes

Reduce Risk: Six Vulnerable Points Enterprises Need to Consider It’s been a few months since the Heartbleed bug was announced to the world, and we continue to see the lingering effects, both directly involving Heartbleed and OpenSSL security. Symantec announced a spam campaign making the rounds that claims to provide a tool to eradicate Heartbleed […]

Written By
SP
Sue Poremba
Jun 9, 2014
Slide Show

Reduce Risk: Six Vulnerable Points Enterprises Need to Consider

It’s been a few months since the Heartbleed bug was announced to the world, and we continue to see the lingering effects, both directly involving Heartbleed and OpenSSL security.

Symantec announced a spam campaign making the rounds that claims to provide a tool to eradicate Heartbleed from your computer, but instead downloads malware. As eSecurity Planet pointed out:

As the researchers note, the email targets victims who don’t have enough technical knowledge to understand that the Heartbleed bug isn’t malware and can’t infect computers.

The article goes on to state that malware appears to give the computer a “clean bill of health,” but in reality, the malware is a keylogger that records everything being typed and takes screen shots from the computer. The malware may be more dangerous to individuals than Heartbleed itself, so employees should be warned not to fall for the spam message at work or on their personal computers.

Symantec has also warned that OpenSSL continues to have security problems. Open SSL recently released a security advisory that includes patches for two critical vulnerabilities. The Symantec blog described the issue:

One of the critical vulnerabilities, OpenSSL CVE-2014-0224 Man in the Middle Security Bypass Vulnerability (CVE-2014-0224), could let an attacker carry out a man-in-the-middle attack, allowing them to intercept traffic between a vulnerable client and a vulnerable server. One way that attackers could exploit this flaw is by setting up a rogue Wi-Fi hotspot in a public area. If a user connects to this rogue access point, the attackers controlling the hotspot could steal their data, even though the traffic is encrypted.

According to an Ars Technica article, this vulnerability is not as severe as Heartbleed because the attacks are more difficult to conduct:

Whereas Heartbleed allowed anyone to send malicious packets that would force a vulnerable machine to divulge passwords, cryptographic keys, and other highly sensitive data, the latest attacks can only bypass encryption for a single targeted connection. And they can only be executed by people with some degree of control over the connection. Without doubt, that’s serious, but not the catastrophe visited by Heartbleed.

The other critical vulnerability affects the secure network communications protocol.

Unfortunately, this news is another hit against open source security, and as Andy Rolfe, CTO at Authentify, told me in an email:

This vulnerability shines a light on the increasing need for financial institutions (FI) to involve account holders in the “backend” protection of their own accounts. A “deputized” customer base can help protect an FI and themselves. Out-of-band transaction verification processes that display transaction or account change details for approval before final execution (post-login) effectively accomplishes that “deputization.” Many FI’s use multi-factor login, but once the login is successfully completed, the MITM vulnerability still exists. Post login verification is the key.

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.