Datalek Bij Bedrijf Dat Miljoenen Websites Online Houdt
... miljoen websites onder meer beschermt tegen offline gaan tijdens digitale aanvallen, heeft last gehad van een datalek. Hierdoor was het voor kwaadwillenden mogelijk om gevoelige informatie te stelen van klanten, waaronder ook Nederlandse sites zoals Wehkamp en Geenstijl. Het probleem is inmiddels opgelost. Dat heeft Tavis Ormandy, beveiligingsonderzoeker bij Google, ontdekt. In een test zag hij dat via het lek onder meer wachtwoorden, cookies van websites en digitale sleutels waarmee beveiliging is uit te schakelen, te downloaden waren. Volgens Cloudflare zijn er geen aanwijzingen dat er misbruik is gemaakt van het lek. Wachtwoord aanpassen. "Websites zoals webwinkels, die gebruikmaken van Cloudflare, moeten nu snel hun gebruikers inlichten en vragen om hun wachtwoord aan te passen", zegt Leander Lakkas van hostingprovider ...
How To Secure Your Data After The Cloudflare Leak
... can provoke in consumers. “It doesn’t appear large numbers of credentials have been compromised, so for a consumer service with limited risk to compromised accounts, it may not be worth the effort. For administrator credentials, or for any sites processing highly sensitive information through Cloudflare, the lack of a quantifiable maximum exposure probably means it is worth forcing a password update,” Lackey wrote in a Medium post. Related Articles. Major Cloudflare bug leaked sensitive data from customers' websites Cloudflare and CREDO are still gagged from talking about national security letters Cloudflare explains how FBI gag order impacted business. You can check out a list of Cloudflare customers to see if websites you use might be affected by the leak — but keep in mind that not all of Cloudflare’s clients were affected. Because of the way Cloudflare’s code was configured, the leak was at its worst for less than a week, when 1 in every 3,300,000 Cloudflare requests might have caused leakage. As Cloudflare notes , that’s just 0.00003% of ...
The Recently Discovered Cloudflare Bug Could Affect Bitcoin Users
... leak got into malicious hands is undetermined, but Bitcoiners on forums are shaken up. The uninitialized memory held by the Cloudflare service includes data such as cookies, HTTP content, passwords, and TLS certificates. The person who discovered the bug, Taviso says, “Cloudflare reverse proxies are dumping uninitialized memory.” Furthermore, Taviso also details “It took every ounce of strength not to call this issue ‘Cloudbleed’”. “I don’t know if this issue was noticed and exploited, but I’m sure other crawlers have collected data and that users have saved or cached content and don’t realize what they have, etc.,” explains Taviso’s opinion concerning the extent of the damage. “We’ve discovered (and purged) cached pages that contain private messages from well-known services, PII from major sites that use cloudflare, and even plaintext API requests from a popular password manager that were sent over https (!).”. To stay precautious Bitcoin users ...
Password Management Made Easy As News Of Cloudflare Leak Surfaces
... the security of the compromised, but still secure, account. Where possible, I would recommend setting up MFA (Multi-Factor Authentication), which will require three pieces to confirm your identity—something you know, something you have, and something you are. When implementing 2 FA/MFA on an account, as a user you are largely dependent on which options the site supports. However, Google Authenticator is pretty widely used and there is an open source hardware token, U 2 F Zero , which you can buy or make yourself. Choosing a username. The point of mouthwash is to wash out any bacteria or guff that might build up and cause damage and infection. Alternating your username regularly has the same effect. It makes it harder for others to track your activities across websites, or for someone to find a weak link in your password management system by trying ...
F5 Networks Gear Found To Contain Ssl Bug By Cloudflare Engineers
... strikes when virtual servers running on Big-IP appliances are configured with a Client SSL profile that has the non-default Session Tickets option enabled. The server can be tricked into leaking 31 bytes of memory at a time. Internet scans conducted by the researcher showed that 949 of the Alexa top one million websites were vulnerable, including 15 in the top 10,000 sites. Of the top one million hosts on Cisco's Umbrella cloud security platform, over 1,600 were found to be affected. Valsorda claims he and a colleague discovered the bug while trying to resolve a Cloudflare customer issue with Session Tickets, to try and resolve what looked like an incompatibility between F 5 TLS and Go TLS. The researcher said that after collecting a number of stack traces: “It looks like the client offers a Session Ticket, the server accepts it, but the ...
This Week's Top Stories
... of a specific browser. This method had a 99.2% accuracy rate when tested on a few thousand computers. The researchers have a demonstration site where you can see if they can fingerprint your computer – I tried three different browsers and it knew me. Ticketbleed Vulnerability (Only) Affects F 5 Devices. Last week an engineer at Cloudflare discovered a new HTTPS vulnerability affecting devices made by F 5. The vulnerability has been named Ticketbleed, and it has been compared to the infamous Heartbleed bug because of similarities in how they work (and their similar names). But while Heartbleed gave most of the internet a good reason to be scared, Ticketbleed only affects a few thousand websites. We talked about why Ticketbleed is not the next Heartbleed. Operation Kingphish Targets Qatar Journalists and Activists. A complex phishing campaign against activists in Qatar has been uncovered. The attacker, who is unknown, but may be a state-sponsored actor, targeted around 30 people. Named Operation Kingphish, the unknown assailant attempted to “steal credentials and spy on the ...
Cloudflare Makes Online Ads 5x Faster, Safer With Firebolt
... loaded slowly and users simply leave the page, advertisers and publishers lose out on crucial impressions. Cloudflare’s Firebolt fixes these problems to benefit publishers, advertisers, and end users by making ads load faster, serving them over secure connections, and verifying that they are malware-free. “Slow, malware-ridden ads drive end users to install ad blockers, and unfortunately, that means publishers lose the ability to make money off broadly accessible content,” explained Matthew Prince, co-founder and CEO of Cloudflare. “Cloudflare's Firebolt addresses the end user concerns of slow, unsafe online advertising , helping ensure that publishers can get paid for their content while still making it available to the broad Internet.”. Key features include. Faster Ad Load Times: Cloudflare's global network of 102 ...
The Pirate Bay Blocked By Congent, Cloudflare Puts Pirate Sites On New Ip Addresses To Avoid Block
... to a court order which required the company to block access to one or more websites, which remain unknown. The real target was accessible through the IP-addresses 104.31.18.30 and 104.31.19.30. Cloud Flare is the hero again. Like every time, Cloudflare emerged as the hero for the torrent websites. As soon as the Cogent block was announced it moved most of the affected sites to a new location, effectively unblocking them. If the Cogent action was against a different target, The Pirate Bay and other torrent websites don’t have to worry about the block for now. “As a company, Cloudflare believes strongly in an open, free, and secure Internet. And it is also our policy to fully comply with the legitimate court process, This can be challenging at times, especially when courts target backbone providers and don’t ...
Uma Falha Que Divulgou Dados Sensíveis De Milhões De Sites
... Fevereiro de 2017, 18:22. Partilhar notícia. 1 Comentário. Qualquer pessoa que se tenha apercebido do erro teve a oportunidade de conseguir aceder a informações pessoais dos utilizadores desses sites Reuters/PAWEL KOPCZYNSKI. A Cloudflare, empresa que está a cargo da protecção dos dados de quase cinco milhões de sites, anunciou, na passada quinta-feira, que detectou um bug no código que permitiu que dados sensíveis de milhares de utilizadores se tornassem públicos. Palavras-chave, cookies e dados de autenticação: tudo podia ser encontrados através de uma pesquisa num motor de busca. Entre os clientes da Cloudflare estão empresas como a Uber, o OK Cupid, o Fit Bit, o Medium ou o Feedly. A Cloudflare anunciou, num post do seu blog , que um dos elementos da equipa de segurança do Google, Tavis Ormandy, tinha detectado um “problema de segurança”. Os servidores da Cloudflare estavam a devolver informação privada – o que não é suposto – “e alguma informação estava a ser guardada em cache [memória rápida] pelos motores de busca”, lê-se na ...
Centralized Web Services Are Wonderful—until They Go Wrong
... user information, such as passwords, cookies, and IP addresses, where it didn't mean to, some of which was cached by search engines. Cloudflare points out that the flaw meant that its servers leaked private information just once in every 3.3 million Web requests it dealt with. But such is the scale of Cloudflare’s operations that those numbers add up—and quickly. Among its clients are the likes of Uber, Fitbit, OKCupid, 4 chan, and 1 Password. All told, as many as 120,000 pages per day from 3,438 domains could have leaked data, and the bug remained undiscovered for over five months. According to Cloudflare’s CEO, John Graham-Cumming, people shouldn’t worry. In a statement issued to the Wall Street Journal that could yet come back to haunt him, he explained that he wasn’t planning to change a single one of his passwords, adding that he thought the risk of them being leaked was “extremely, extremely small.” (If you’re not so confident, here’s what to do.). But it’s a telling reminder of what can happen when a large number of users rely on a single service—and not every fault can be overcome with a ...
Cloudflare Patches Bug That Leaked Data From Uber, Fitbit And Others
... that involved corrupted web pages being returned by some HTTP requests run through Cloudflare. “I’m finding private messages from major dating sites, full messages from a well-known chat service, online password manager data, frames from adult video sites, hotel bookings,” Ormandy wrote. “We’re talking full HTTPS requests, client IP addresses, full responses, cookies, passwords, keys, data, everything.”. Cloudflare operates as a CDN, a system of distributed servers that delivers web pages and other web content to a user based on geographic location. It’s used by companies to distribute their services across the globe. For example, if you’re in Southeast Asia and contacting Uber your web or app request would go through Cloudflare’s servers in Singapore versus contacting Uber’s servers in the United States directly. What Travis found is that secure requests through Cloudflare’s network were corrupted, making user details, including passwords, publicly available. Even more disturbingly, the details were made so available that the data was cached by Google and other search engines. Cloudflare is downplaying the incident, saying that despite the fact that data ...
A Court Order Blocked Pirate Sites That Weren’t Supposed To Be Blocked
... to block specific websites becomes a problem for websites that aren't supposed to be blocked, Cloudflare General Counsel Doug Kramer told Ars yesterday. On Cloudflare’s network, there are multiple domains on an IP address, and IP addresses assigned to websites can change. Dangers in censoring the Internet. “This is part of the danger you get into when you start to censor the Internet or you get orders to pull things down,” Kramer said. “It may not be so easy to limit access to a specific domain," or to make sure a block applies only in a certain country. Cogent, and not Cloudflare, is the company that had to implement the block, but Cloudflare is “trying to set up a technical system where Cogent can respond to the order that they’ve been given, but within the narrow scope of that and not have impacts that go beyond that,” Kramer said. That effort may already have been successful. Running traceroutes on Cogent’s Looking Glass website now shows a network path to The Pirate Bay and the other websites that were reportedly blocked, although neither Cogent or ...
No comments:
Post a Comment