301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

Back in 1998, researcher Daniel Bleichenbacher found what is being called the ROBOT exploit in the secure sockets layer (SSL) encryptions that protect web-based platforms. There is a flaw in an algorithm that is responsible for the RSA encryption key--through specially constructed queries its error messages divulge enough information that after a short time they were able to decrypt ciphertext without the dedicated key for that encryption. In response, SSL architects created workarounds to limit error messages rather than eliminating the faulty RSA algorithm.

Referred to as an “Oracle” by researchers, the crypto-vulnerability provides only decisive yes and no answers, which allows people that form their queries a certain way to eventually retrieve detailed information about the contents of encrypted data. This is called an “adaptive chosen-ciphertext attack”.

Recently, researchers have found that over a quarter of the 200 most-visited websites essentially have this vulnerability, and about 2.8 percent of the top million. Facebook, the most visited website in the world for 2017, is one; while the money transfer platform PayPal is another. The explanation researchers gave was that with so much time focusing on the newest and baddest malware and exploits, this tried and true vulnerability has just been neglected. In a blog post they said as much:

“The surprising fact is that our research was very straightforward. We used minor variations of the original attack and were successful. This issue was hiding in plain sight. This means neither the vendors of the affected products nor security researchers have investigated this before, although it's a very classic and well-known attack.”

The vulnerability, now called ROBOT, an acronym for “Return of Bleichenbacher's Oracle Threat” was tested, with the findings being sent to the vulnerable sites to ensure they could get a patch created before the researchers went public with it.

Understanding the threats that are being used against businesses can go a long way toward helping you keep yours secure. For more information about the ROBOT vulnerability or what we can do to keep your company’s network secure, contact Washington Works today at 301-571-5040.

Tip of the Week: Do You Know What Your Android Per...
Here’s Our Rundown on Blockchain Technology


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 16 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Privacy Business Computing Malware Hackers Network Security Business Backup Productivity Microsoft Ransomware Email User Tips Software Smartphone Office 365 Managed IT Services Small Business Windows 10 Internet Computer Android IT Services Business Continuity Mobile Devices Hosted Solutions Google Efficiency Managed Service Provider Remote Monitoring Smartphones Encryption Hardware Cloud Computing Data Management Data Recovery Browser Work/Life Balance Social Media Workplace Tips Tip of the week Outsourced IT Productivity Hosted Solution Word Unified Threat Management Money Facebook Phishing Disaster Recovery Risk Management How To IT Support Business Management Windows Apps SaaS Government Cybersecurity Big Data Password Windows 10 Save Money Communication App Holiday Telephone Systems Office Taxes Politics Virtual Private Network Firewall Websites Artificial Intelligence Saving Money Botnet Virtual Reality Automation Two-factor Authentication Bandwidth Data Antivirus Data Backup Collaboration Twitter Managed IT Services Paperless Office Computer Care Robot Maintenance Employer-Employee Relationship Innovation BYOD Recovery Training File Sharing Wi-Fi Automobile Alert Scam Health Samsung Vulnerability Mobile Device Physical Security Hacker IT Management Computing Motion Sickness Customer Relationship Management Multi-Factor Security VPN YouTube WiFi Managed IT Service Data Security Legal Quick Tips Server Management Office Tips Computing Infrastructure Notifications Google Calendar Social Settings GPS IT Solutions IT Consultant Break Fix Sports Google Drive Statistics Solid State Drive Alerts Meetings Legislation Mail Merge Digital Tracking VoIP Upgrades Mobile Device Management Dark Web Techology Bluetooth Hard Disk Drive Administrator Document Management Webcam Mouse Address Spyware Avoiding Downtime Education Machine Learning Microsoft Excel Unified Threat Management Black Market Point of Sale Tech Support Crowdsourcing Tablet Time Management Cleaning Relocation Internet of Things User Error Identity Theft Budget Comparison Gadgets Personal Information How To Update Network Management Private Cloud Blockchain Downtime Managed IT Supercomputer Web Server Specifications Business Technology Analytics Touchscreen IT Support Error Permissions Upgrade Remote Computing Printer Outlook Corporate Profile IT Budget Virtualization Cameras Black Friday Lenovo Computer Repair Chrome Chromebook Cabling Wireless Communications Fraud Cybercrime Processors Access Control Shortcut WannaCry Search Digital Payment Server CCTV Law Enforcement Cyber Monday Superfish Firefox Infrastructure Mobile Security SharePoint Patch Management Monitors Staffing Cortana Gadget Smart Technology Passwords Vendor Management Emoji Heating/Cooling Disaster Hotspot Travel IBM Downloads Data loss Network G Suite Distributed Denial of Service Networking Electronic Medical Records Servers Uninterrupted Power Supply Microsoft Office Language IP Address Website Customer Service Mobile Office Domains Hard Drives Spam Licensing Public Speaking Lithium-ion battery Augmented Reality CrashOverride Safety The Internet of Things Hiring/Firing Emergency Competition Fun Users Miscellaneous VoIP Presentation 5G Wireless Technology Marketing