Hey there, time traveller!
This article was published 13/4/2014 (1171 days ago), so information in it may no longer be current.
The Heartbleed bug sounds like a nasty coronary condition. It actually is a software flaw that has left as many as two-thirds of the world's websites vulnerable to attack by hackers.
"This is potentially the most dangerous bug that we have seen for a long, long time," says James Beeson, the chief information-security officer of G.E. Capital Americas, an arm of General Electric.
Since April 7, when its existence was revealed by researchers at Google and Codenomicon, a security firm, countless companies around the world that rely on the Internet for part or all of their business have been scrambling to fix the flaw.
Ironically, the bug was discovered in Open SSL, encryption software that was designed to make the Internet more secure. Available free, this open-source code is popular with businesses and governments, which use it to help secure everything from online credit-card transactions to public services. On April 9, for instance, Canada's tax authority shut off public access to its online services while it checked the security of its systems in the light of news about the bug.
The flaw makes it possible for hackers to trick a server into spewing out data held in its memory. Open SSL has a feature known as a "heartbeat" that allows a computer at one end of an encrypted link to send occasional signals to the computer at the other end of it, to check that it is still online. The researchers discovered a hacker with knowledge of the bug could replicate this signal and use it to steal all manner of data from a remote computer.
Those data could include encryption keys that let hackers decipher traffic. To make matters worse, the researchers found the bug, which is present in some versions of Open SSL that have been available since March 2012, allows attacks to be mounted without leaving a trace in targeted computers' "server logs," meaning victims are unaware their systems have been compromised. In other words, it is impossible to tell for sure what damage has been done.
The bug has forced companies to find out fast how many of their systems employ the vulnerable versions of Open SSL.
"Everyone knows they have to patch their customer-facing Internet websites," says Jonathan Sander of Stealthbits Technologies, a security firm that is helping one of America's biggest banks work out where it has deployed the buggy software, "but that is only the tip of the iceberg."
Web-connected systems that handle things such as accounting and personnel data will also need to be checked for the bug, he says.
Sander likens the discovery of the Heartbleed bug to finding a faulty part in nearly every make and model of car. The problem is the Internet cannot be recalled. Big web companies such as Google and Yahoo have moved fast to deal with the bug, but millions of smaller e-commerce sites and other businesses face the worrying prospect of being attacked by hackers, newly alerted to the bug's existence, even as the firms race to fix the problem.
The cure includes applying a software "patch" and then choosing new encryption keys to replace those that may have been compromised. Once this has been done, customers often will need to change their passwords. Tumblr, a blogging service owned by Yahoo, has urged its users to change the passwords they use for all of the secure online services that hold sensitive data about them. Some companies even chose to suspend services while they were working on a fix. Bitstamp, a bitcoin e-currency exchange, temporarily suspended new account registrations and log-ins to its existing accounts.
Perhaps the risk posed by the Heartbleed bug will turn out to be overblown. If it emerges companies' systems have indeed been hacked because of it, however, this could open a legal can of worms.
Firms could argue they ought not to be punished for using widely trusted security software. However, aggrieved customers -- and their lawyers -- may see things differently.
How the bug got into the Open SSL software in the first place is a mystery. Bruce Schneier, an Internet-security expert, argues in a blog post "the probability is close to one" that intelligence agencies have exploited the glitch to nab the encryption keys needed to decipher information about their targets.
His guess is the glitch is the result of a coding error, rather than the handiwork of spies, though he cannot be sure.
No matter who is to blame, this episode is another reminder of the security challenges companies face as ever more economic activity shifts online.
According to e-Marketer, a research company, worldwide business-to-consumer e-commerce sales are likely to grow by slightly more than a fifth this year, to $1.5 trillion. That is a huge commercial opportunity, but it also will encourage cyber-crooks to target businesses even more vigorously.
Expect more computer-security heartburn in boardrooms.