Heartbleed bug creates confusion online

Screenshot from Minecraft Minecraft-maker Mojang shut down game servers for several hours while potentially vulnerable software was patched

Related Stories

Computers vulnerable to the Heartbleed bug are actively being targeted online, say security experts.

However, it is not yet clear whether the scanning efforts are benign or are the work of cyber-thieves keen to steal data, they say.

The news comes as some security professionals and developers advised people to change all their passwords.

But Google said that logins for its services did not need to be reset unless they were used on other sites.

That contradicted advice from Yahoo's blogging platform Tumblr and the developers of the app If This Then That who have told users they should change their passwords "everywhere".

The conflicting guidance is further complicated by the fact that experts say updating a password is useless unless a site has patched its servers - but it is not always obvious to the public when this is the case.

Attack pattern

News about the Heartbleed bug broke on 8 April and has kicked off a frenzy of activity as web companies check to see if their systems are vulnerable.

The bug emerged in software that should have kept data passing between sites and users safe from scrutiny. Instead the bug meant that attackers could use specially crafted queries to slowly steal data from servers.

Ars Technica reported that some sites had seen evidence that networks of bots were probing them for the Heartbleed weakness long before the bug was publicised.

Rory Cellan-Jones looks at ways to manage strong online passwords

Information about scans of vulnerable servers are also circulating among security researchers. One scan turned out to pose no threat as whoever was behind it simply told the gaming company who ran the computers that they were leaking data.

"It's difficult to detect an attack unless you are actively looking for it," said Ken Munro, an analyst at security company Pen Test Partners. He added that many intrusion detection systems had now added signatures that spot the subtle signs that a Heartbleed-inspired attack is under way.

In addition, organisations running "honeypots" that try to trick hackers into attacking bogus web servers have written code that generates nonsensical server data in response to Heartbleed requests.

About 500,000 servers are vulnerable to the Heartbleed bug, statistics from net monitoring company Netcraft suggest.

Many large sites that ran vulnerable servers have now patched their systems and many others are following suit. However, a huge number of sites still remain vulnerable. Websites have sprung up that let people check if a site they use is vulnerable.

Conflicting advice has been given to web users from different companies about about whether they should be updating their passwords. Google said users did not need to change credentials; Facebook advised users to make a change; and others, such as web service If This Then That, said users should change all passwords.

Users should first check to see if a site they were using was vulnerable to the bug and whether they had taken action to fix it, said James Lyne, global head of research at Sophos. Changing a password on an unprotected site could still leave people open to data theft, he said.

In addition, he added, the rush to change passwords was likely to encourage phishing gangs to start sending out bogus messages advising people to reset or change their passwords.

"This is not the first defect of its kind and it certainly won't be the last, but it is one of the more serious faults we've seen in recent internet history," said Mr Lyne.

Name Vulnerable? Patched? Change password?

Amazon

No

No need

Only if shared with vulnerable service

Amazon Web Services

Yes

Yes

Yes

Apple

No

No need

Not clear

Barclays

No

No

Only if shared with vulnerable service

eBay

No

No need

Only if shared with vulnerable service

Evernote

No

No need

Only if shared with vulnerable service

Facebook

Yes

Yes

Yes

Google/Gmail

Yes

Yes

Yes

HSBC

No

No need

Only if shared with vulnerable service

If This Then That

Yes

Yes

Will force users to log out and ask them to update

LinkedIn

No

No need

Only if shared with vulnerable service

Lloyds

No

No need

No

Microsoft/Hotmail/Outlook

No

No need

Only if shared with vulnerable service

PayPal

No

No need

Only if shared with vulnerable service

RBS/Natwest

No

No need

Only if shared with vulnerable service

Santander

No

No need

Only if shared with vulnerable service

Tumblr

Yes

Yes

Yes

Twitter

No

No need

Only if shared with vulnerable service

Yahoo/Yahoo Mail

Yes

Yes

Yes

More on This Story

Related Stories

The BBC is not responsible for the content of external Internet sites

More Technology stories

RSS

Features & Analysis

BBC Future

(USAF)

Secrets of the aircraft boneyards

The vast storage sites for surplus planes Read more...

Programmes

  • A person taking a photo of fireworks on a smartphoneClick Watch

    A look at the latest gadgets which could make it easier to take the perfect night-time picture

BBC © 2014 The BBC is not responsible for the content of external sites. Read more.

This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.