• Reuters, Bloomberg


The White House and U.S. intelligence agencies said on Friday that neither the National Security Agency nor any other part of the government was aware before this month of the “Heartbleed” bug, denying a report that the spy agency exploited the glitch in widely used Web encryption technology to gather intelligence.

The White House, the NSA and the Office of the Director of National Intelligence issued statements after Bloomberg reported that the NSA was aware of the bug for at least two years and exploited it in order to obtain passwords and other basic information used in hacking operations. Bloomberg cited two unnamed sources whom it said were familiar with the matter.

The Heartbleed bug is considered one of the most serious Internet security flaws to be uncovered in recent years.

“Reports that NSA or any other part of the government were aware of the so-called Heartbleed vulnerability before April 2014 are wrong,” White House National Security Council spokeswoman Caitlin Hayden said in a statement. “This administration takes seriously its responsibility to help maintain an open, interoperable, secure and reliable Internet.”

Bloomberg was not immediately available to comment.

The discovery of Heartbleed by researchers with Google and a small security firm, Codenomicon, prompted the U.S. Homeland Security Department to advise businesses on Tuesday to review their servers to see if they were using vulnerable versions of widely used software known as OpenSSL.

OpenSSL is used to encrypt email and other communications and to protect the websites of big Internet companies, including Facebook, Google and Yahoo. The bug, disclosed Monday, allows hackers to steal data without a trace.

NSA spokeswoman Vanee Vines said in a statement, “NSA was not aware of the recently identified vulnerability in OpenSSL, the so-called Heartbleed vulnerability, until it was made public in a private-sector cybersecurity report.”

Hayden said the federal government relies on OpenSSL to protect the privacy of users of government websites and other online services. “If the federal government, including the intelligence community, had discovered this vulnerability prior to last week, it would have been disclosed to the community responsible for OpenSSL,” Hayden added.

Hayden said that when U.S. agencies discover a new vulnerability in commercial and open-source software, “It is in the national interest to responsibly disclose the vulnerability rather than to hold it for an investigative or intelligence purpose.” Such vulnerabilities are known as “zero-day” flaws because software developers have had zero days in which to fix them.

In December, a five-member advisory panel that had been convened to review electronic surveillance policy urged the White House to sharply curtail the use of undisclosed flaws and stop undercutting encryption standards. The panel included former White House cybersecurity adviser Richard Clarke.

In late February, a senior White House official said the Obama administration was intensively studying both issues.

The administration statements issued on Friday confirmed that the review had already “reinvigorated an interagency process for deciding when to share vulnerabilities” on a case-by-case basis.

The activities of the NSA have come under sharp scrutiny since former agency contractor Edward Snowden leaked numerous documents exposing expansive U.S. surveillance efforts.

Even before Snowden’s emergence, former officials, including Clarke, said that offensive and spying considerations had dominated inside the NSA, causing it to withhold information instead of warning the public about new flaws.

Clarke said Friday that the NSA had not known of Heartbleed.

The U.S. government warned banks and other businesses on Friday to be on alert for hackers seeking to steal data exposed by the bug.

A German programmer who volunteered with OpenSSL took responsibility for inadvertently launching the security crisis. Programmer Robin Seggelmann said the bug was his handiwork and that it was an honest, “trivial” mistake. The reviewer of his code, Englishman Stephen Henson, one of a “core team” of enthusiasts supporting the OpenSSL library, also missed it.

It is not known yet whether anyone has exploited the vulnerability the two men created.

In a time of both misinformation and too much information, quality journalism is more crucial than ever.
By subscribing, you can help us get the story right.