The Heartbleed Hit List
http://mashable.com/2014/04/09/heartbleed-bug-websites-affec…
I received a call from Citibank credit cards yesterday and they said my card may have been compromised and wanted to issue a new one. The lady on the phone couldn't really provide much details but she said that it was likely that I dealt with a merchant who was attacked and visa had instructed them to issue new cards.
Was anyone else affected by the Heartbleed bug ?
All I can say that there is a lot of media beatup and misunderstanding here. First of all, IS OZBARGAIN AFFECTED BY HEARTBLEED BUG?
Yes. We migrated from Debian 6 to Debian 7 Wheezy on 17 February. Debian 6 uses openssl 0.9.8o whereas Debian 7 uses openssl 1.0.1e — so in theory we are vulnerable since mid-February. When I read about heartbleed yesterday morning the first thing I did was applying security updates, but it still left around 6-7 weeks window where data transmitted between your computer and OzBargain could have been compromised.
However are we all safe now? Not so sure. The biggest issue with heartbleed is not that the attacker is able to obtain the TLS session key to decrypt your data. The attacker is also able to obtain server's private key and certificates. The attacker can then set up his/her own website with the stolen key/certificate, and can attempt Men-In-The-Middle attacks even when the website is now all fully patched. The proper fix for website operator is to issue a certificate revocation (saying the old key/cert pair is bad), create a new private key and get a new certificate from CA. Only after that you can feel more safe.
Not many websites have done it though. You can check the Issue Date of the certificate to see whether a new one is in place. We don't — I have my finger crossed that we didn't get targeted :) From the list of providers that said they have patched up the software — some do, but not many of them get the new certificates though.