Home / Software & Gaming / Security / HTTPS vulnerable to new hacking method

HTTPS vulnerable to new hacking method

As if we didn't have enough security concerns at the moment, here comes another one to make the situation worse. HTTPS, long the staple of website logins, is now said to be vulnerable to a new Department of Homeland Security debuted vulnerability, that allows those using it to potentially steal plaintext information from an HTTPS stream.

Unveiled last Thursday at the Black Hat conference in Las Vegas by Salesforce.com, the attack is described (by InformationWeek) as a, ” man in the middle HTTPS crypto attack,” that is launched by watching the size of the “cipher text received by the browser, while triggering a number of strategically crafted requests to a target site.”

blackhat
Something tells me a lot of people leave this feeling very paranoid

It's still somewhat archaic in that the sender has to have some idea of what the correct information might be. When they strike lucky, the HTTPS response will be smaller and therefore let on that they've guessed correctly. It apparently takes around 4,000 requests usually, but then again, they can be completed in around 30 seconds.

The response from the security community has been to suggest a fix for the HTTPS protocol, but it won't be easy. The only upside of the whole thing is that the hack needs to be triggered on a site by site basis, so it can't be applied to a large number at a time. Hackers would also need to be able to passively monitor the target's internet traffic, which would potentially mean they need to be on the same local network – which is unlikely in a lot of cases.

KitGuru Says: Hopefully that means the HTTPS is relatively safe for now, but as usual, take basic steps to keep your data secure. Use unique, complicated passwords for everything you do online.

Become a Patron!

Check Also

Marvel Rivals has a major security issue enabling Remote Code Execution

A Remote Code Execution exploit has been discovered in Marvel Rivals, allowing hackers to remotely spread malware through the game.

We've noticed that you are using an ad blocker.

Thank you for visiting KitGuru. Our news and reviews teams work hard to bring you the latest stories and finest, in-depth analysis.

We want to be as informative as possible – and to help our readers make the best buying decisions. The mechanism we use to run our business and pay some of the best journalists in the world, is advertising.

If you want to support KitGuru, then please add www.kitguru.net to your ad blocking whitelist or disable your adblocking software. It really makes a difference and allows us to continue creating the kind of content you really want to read.

It is important you know that we don’t run pop ups, pop unders, audio ads, code tracking ads or anything else that would interfere with the KitGuru experience. Adblockers can actually block some of our free content, such as galleries!