14 April 2014
Last updated at 14:12 ET
Mumsnet - which says it has 1.5 million registered members -
said that it believed that the cyber thieves may have obtained passwords
and personal messages before it patched its site.
The Canada Revenue Agency said that 900 people's social insurance numbers had been stolen.
These are the first confirmed losses.
The Mumsnet site's founder Justine Roberts told the BBC that it
became apparent that user data was at risk when her own username and
password were used to post a message online.
She said the hackers then informed Mumsnet's administrators that the attack was linked to the Heartbleed flaw and told them the company's data was not safe.
"On Friday 11 April, it became apparent that what is widely known as the Heartbleed bug had been used to access data from Mumsnet users' accounts," the London-based website added in an email to its members.
"We have no way of knowing which Mumsnetters were affected by this.
"The worst case scenario is that the data of every Mumsnet user account was accessed.
"It is possible that this information could then have been used to log in as you and give access to your posting history, your personal messages and your personal profile, although we should say that we have seen no evidence of anyone's account being used for anything other than to flag up the security breach, thus far."
The site added that it was forcing its members to reset any password created on or before Saturday.
Canada's tax agency was one of the first major organisations to cut services as a result of the flaw in OpenSSL - a cryptographic software library used by services to keep data transmissions private.
However, its action last Tuesday appears to have come too late.
"Regrettably, the CRA has been notified by the Government of Canada's lead security agencies of a malicious breach of taxpayer data that occurred over a six-hour period," the agency said on a message posted to its homepage.
"Based on our analysis to date, social insurance numbers (Sin) of approximately 900 taxpayers were removed from CRA systems by someone exploiting the Heartbleed vulnerability."
"We are currently going through the painstaking process of analysing other fragments of data, some that may relate to businesses, that were also removed."
Heartbleed flaw
Heartbleed hacks hit Mumsnet and Canada's tax agency
To see video:
http://www.bbc.com/news/technology-27028101
A
leading UK site for parents and the Canadian tax authority have both
announced they have had data stolen by hackers exploiting the Heartbleed
bug.
The Canada Revenue Agency said that 900 people's social insurance numbers had been stolen.
These are the first confirmed losses.
She said the hackers then informed Mumsnet's administrators that the attack was linked to the Heartbleed flaw and told them the company's data was not safe.
"On Friday 11 April, it became apparent that what is widely known as the Heartbleed bug had been used to access data from Mumsnet users' accounts," the London-based website added in an email to its members.
"We have no way of knowing which Mumsnetters were affected by this.
"The worst case scenario is that the data of every Mumsnet user account was accessed.
"It is possible that this information could then have been used to log in as you and give access to your posting history, your personal messages and your personal profile, although we should say that we have seen no evidence of anyone's account being used for anything other than to flag up the security breach, thus far."
The site added that it was forcing its members to reset any password created on or before Saturday.
Canada's tax agency was one of the first major organisations to cut services as a result of the flaw in OpenSSL - a cryptographic software library used by services to keep data transmissions private.
However, its action last Tuesday appears to have come too late.
"Regrettably, the CRA has been notified by the Government of Canada's lead security agencies of a malicious breach of taxpayer data that occurred over a six-hour period," the agency said on a message posted to its homepage.
"Based on our analysis to date, social insurance numbers (Sin) of approximately 900 taxpayers were removed from CRA systems by someone exploiting the Heartbleed vulnerability."
"We are currently going through the painstaking process of analysing other fragments of data, some that may relate to businesses, that were also removed."
Heartbleed flaw
The Heartbleed bug was made public a week ago by Google and Codenomicon, a small Finnish security firm, which independently identified the problem.
OpenSSL is used to digitally scramble data as it passes between a user's device and an online service in order to prevent others eavesdropping on the information.
It is used by many, but not all, sites that show a little padlock and use a web address beginning "https".
The researchers discovered that because of a coding mishap hackers could theoretically access 64 kilobytes of unencrypted data from the working memory of systems using vulnerable versions of OpenSSL.
Although that is a relatively small amount, the attackers can repeat the process to increase their haul.
'Dangerous' advice
OpenSSL is used to digitally scramble data as it passes between a user's device and an online service in order to prevent others eavesdropping on the information.
It is used by many, but not all, sites that show a little padlock and use a web address beginning "https".
The researchers discovered that because of a coding mishap hackers could theoretically access 64 kilobytes of unencrypted data from the working memory of systems using vulnerable versions of OpenSSL.
Although that is a relatively small amount, the attackers can repeat the process to increase their haul.
'Dangerous' advice
Mumsnet has been criticised for one aspect of its handling of
the breach - its email to members contains an inline link that it
suggests they click to reset their passwords.
However, UK police had previously warned members of the public to beware of unsolicited email asking them to click links "even if they are from companies you are familiar with".
This is because fraudsters are taking advantage of Heartbleed to mount phishing attacks in which users are directed to spoof sites designed to steal their credentials.
"It is dangerous," Dr Steven Murdoch, a computer security researcher at the University of Cambridge told the BBC.
"Probably what [Mumsnet] should have done is sent out an email saying 'go to our website using the normal address [to reset the password]'.
"If people receive an email they have not asked for they should be suspicious."
By contrast Canada's tax agency said it would not call or email the individuals it believed to be affected by its breach in order to avoid giving criminals a chance to exploit the situation.
Instead it said it would send out registered letters.
"I believe we'll see many more of these announcements over the coming days," Keith Bird, UK managing director of internet security firm Check Point said.
"However, people should double-check that the website or service they use is actually advising them to choose a new password before making any changes to their settings.
"This way, they can be sure the website has updated its security, and that they're not running the risk of exposing a new password. And if a service does recommend changing passwords, don't choose one that you already use for other websites."
However, UK police had previously warned members of the public to beware of unsolicited email asking them to click links "even if they are from companies you are familiar with".
This is because fraudsters are taking advantage of Heartbleed to mount phishing attacks in which users are directed to spoof sites designed to steal their credentials.
"It is dangerous," Dr Steven Murdoch, a computer security researcher at the University of Cambridge told the BBC.
"Probably what [Mumsnet] should have done is sent out an email saying 'go to our website using the normal address [to reset the password]'.
"If people receive an email they have not asked for they should be suspicious."
By contrast Canada's tax agency said it would not call or email the individuals it believed to be affected by its breach in order to avoid giving criminals a chance to exploit the situation.
Instead it said it would send out registered letters.
"I believe we'll see many more of these announcements over the coming days," Keith Bird, UK managing director of internet security firm Check Point said.
"However, people should double-check that the website or service they use is actually advising them to choose a new password before making any changes to their settings.
"This way, they can be sure the website has updated its security, and that they're not running the risk of exposing a new password. And if a service does recommend changing passwords, don't choose one that you already use for other websites."
No comments:
Post a Comment
Please leave a comment-- or suggestions, particularly of topics and places you'd like to see covered