DHS: Heartbleed not a threat to federal websites
- By Mark Rockwell
- Apr 11, 2014
The federal government's key public-facing websites are not vulnerable to the Heartbleed OpenSSL security flaw, according to a cybersecurity leader at the Department of Homeland Security.
Larry Zelvin, director of DHS' National Cybersecurity and Communications Integration Center, wrote in a post today on DHS' blog that "the federal government’s core citizen-facing websites are not exposed to risks from this cybersecurity threat. We are continuing to coordinate across agencies to ensure that all federal government websites are protected from this threat."
Zelvin did not explain how that determination was made, and Web security experts have said exposure to the problem varies depending on sites’ security and architecture.
The Heartbleed flaw, which can be exploited to cripple encryption in Web communications and transactions, has potentially enormous reach, according to Codenomicon, one of the companies that discovered it. Officials posted a notice online earlier this week saying, "Your popular social site, your company's site, commerce site, hobby site, site you install software from or even sites run by your government might be using vulnerable OpenSSL.”
Zelvin said that immediately upon learning of the flaw, the department’s U.S. Computer Emergency Readiness Team issued an alert to share information with the public and recommend steps to mitigate the threat. At the same time, the department's Industrial Control System Cyber Emergency Response Team published information and reached out to vendors and asset owners to determine the potential vulnerabilities to computer systems that control essential systems -- such as critical infrastructure and financial systems. And the National Coordinating Center for Communications provided situational awareness to the government’s partners in the communications sector.
However, Zelvin cautioned that even though there have been no reports of attacks involving the vulnerability, "it is still possible that malicious actors in cyberspace could exploit unpatched systems."
He advised people to delay changing their online passwords until sites are secured by their owners. He also counseled keeping a close eye on email, bank and social media accounts for abnormal activity, and making sure the HTTPS identifier appears in the address bar when logging onto websites to use credit cards or input other sensitive information.
Mark Rockwell is a staff writer covering acquisition, procurement and homeland security. Contact him at firstname.lastname@example.org or follow him on Twitter at @MRockwell4.