recommended reading

Federal Websites Avoid Heartbleed Risks, DHS Says


The government’s main public websites are not at risk from the security vulnerability Heartbleed, the Homeland Security Department said Friday, although many of the sites -- including -- were built on systems that were susceptible.

Officials declined to provide details on how sites hosted by compromised systems, such as Akamai Technologies and Apache servers, were immune from the possibility of hacks exploiting the Heartbleed bug. The National Security Council denied a Bloomberg News story Friday that the National Security Agency knew of and exploited the coding glitch. 

"Reports that NSA or any other part of the government were aware of the so-called Heartbleed vulnerability before April 2014 are wrong," NSC spokeswoman Caitlin Hayden said in an email to reporters. Had the federal government known about it earlier, she said, it would have disclosed the security flaw.

DHS officials on Friday morning posted a blog entry saying the bug does not jeopardize personal information on key federal websites. The “government’s core citizen-facing websites are not exposed to risks from this cybersecurity threat,” wrote Larry Zelvin, director of the DHS National Cybersecurity and Communications Integration Center. “We are continuing to coordinate across agencies to ensure that all federal government websites are protected from this threat.”

DHS and White House officials would not provide further details after the blog post. The Centers for Medicare and Medicaid Services on Thursday said and consumer accounts were not affected by the vulnerability. CMS directed further questions about Heartbleed to the White House.

Heartbleed is an apparently accidental error in encryption coding used widely on websites across the Internet. Since it was publicly disclosed on April 7, system operators worldwide have been in a mad dash to update their machines. Akamai’s servers, for example, were vulnerable until a patch was recently released, according to the company.

Web surfers have been advised to change passwords on specific sites that were vulnerable but now are fixed because their passwords could have been among previously stolen data. Heartbleed may also allow hackers to impersonate sites that haven't implemented thorough fixes.

Analysts said the potential for problems depends on the type of information Akamai was handling.

“If they were transferring personal information, then that data would be at risk,” regardless of government security protections, said Jerry Irvine, a member of the National Cyber Security Partnership, a public-private organization.

"If they were using Akamai for services other than direct data input,” such as for hosting photos and other multimedia, “then personal information would not have been at risk,” added Irvine, who consults with state and local governments on information security. 

Many other federal websites are in the same position, according to the researchers. The Heartbleed vulnerability originates in code for OpenSSL, a popular encryption tool. Apache, one of the most common Web servers running federal websites, uses OpenSSL by default, said Johannes Ullrich, dean of research at the SANS Technology Institute.

The compromised OpenSSL version has been running loose on the Internet since March 2012, according to Codnomicon, one of the security firms that discovered Heartbleed.

In her denial of  alleged of prior knowledge of Heartbleed, NSC's Hayden said the Obama administration takes Internet security and reliability seriously. "The federal government relies on OpenSSL to protect the privacy of users of government websites and other online services," she said. "If the federal government, including the intelligence community, had discovered this vulnerability prior to last week, it would have been disclosed to the community responsible for OpenSSL."

DHS officials on Tuesday issued a blunt warning to all system operators: "Any keys generated with a vulnerable version of OpenSSL should be considered compromised and regenerated and deployed after the patch has been applied."

The advisory began by noting that Heartbleed could allow intruders to extract private memory in chunks of 64k at a time -- and go back for seconds -- until they "retrieve the intended secrets," including usernames and passwords, sensitive data and secret keys.

Fissures have been detected and mended in code before. So far, federal officials have not reported any major cases of unauthorized access to sensitive information.  

Threatwatch Alert

Stolen credentials

Hackers Steal $31M from Russian Central Bank

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.