Cybersecurity

DHS: Heartbleed not a threat to federal websites

Heartbleed

The federal government's key public-facing websites are not vulnerable to the Heartbleed OpenSSL security flaw, according to a cybersecurity leader at the Department of Homeland Security.

Larry Zelvin, director of DHS' National Cybersecurity and Communications Integration Center, wrote in a post today on DHS' blog that "the federal government’s core citizen-facing websites are not exposed to risks from this cybersecurity threat. We are continuing to coordinate across agencies to ensure that all federal government websites are protected from this threat."

Zelvin did not explain how that determination was made, and Web security experts have said exposure to the problem varies depending on sites’ security and architecture.

The Heartbleed flaw, which can be exploited to cripple encryption in Web communications and transactions, has potentially enormous reach, according to Codenomicon, one of the companies that discovered it. Officials posted a notice online earlier this week saying, "Your popular social site, your company's site, commerce site, hobby site, site you install software from or even sites run by your government might be using vulnerable OpenSSL.”

Zelvin said that immediately upon learning of the flaw, the department’s U.S. Computer Emergency Readiness Team issued an alert to share information with the public and recommend steps to mitigate the threat. At the same time, the department's Industrial Control System Cyber Emergency Response Team published information and reached out to vendors and asset owners to determine the potential vulnerabilities to computer systems that control essential systems -- such as critical infrastructure and financial systems. And the National Coordinating Center for Communications provided situational awareness to the government’s partners in the communications sector.

However, Zelvin cautioned that even though there have been no reports of attacks involving the vulnerability, "it is still possible that malicious actors in cyberspace could exploit unpatched systems."

He advised people to delay changing their online passwords until sites are secured by their owners. He also counseled keeping a close eye on email, bank and social media accounts for abnormal activity, and making sure the HTTPS identifier appears in the address bar when logging onto websites to use credit cards or input other sensitive information.

About the Author

Mark Rockwell is a staff writer at FCW.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group