Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

20-Year-Old Exploit Finds New Life as ROBOT

20-Year-Old Exploit Finds New Life as ROBOT

There is no shortage of threats on the Internet, from situational issues to deliberate attacks meant to damage your company or steal your valuable data. While new threats pop up almost every day, some have been around for some time--so long, that many seem to not consider them as viable threats.

This can be seen in many considerably-sized Internet companies, including the likes of Facebook and PayPal, which recently tested positive for a vulnerability discovered in 1998 that enabled encrypted data to be decrypted.

When it was first discovered by researcher Daniel Bleichenbacher, this exploit was found in the secure sockets layer, or SSL, encryptions that protected (and still protect) many web platforms and websites. The algorithm that powers the RSA encryption has a flaw that permits a hacker to decrypt ciphertext without the key. The error messages that the encryption presents give hackers enough information to crack it.

As it would happen, instead of eliminating and reworking the flawed RSA algorithm, the SSL architects at the time simply created workarounds to limit the error messages.

This crypto-vulnerability, codenamed “Oracle,” provides “yes” and “no” answers to queries. This means that cybercriminals can phrase their queries specifically enough to ultimately retrieve enough information to form a detailed picture of the encrypted contents. This method is referred to as an adaptive chosen-ciphertext attack.

Recently, researchers have discovered that this vulnerability can be found on over a quarter of the 200 most-visited websites on the Internet, and on around 2.8% of the top million. Naturally, this includes Facebook and PayPal.

Researchers explained the oversight of what is now being called ROBOT, or Return Of Bleichenbacher’s Oracle Threat, as the result of too much focus being directed towards new threats, and the older ones being neglected as a result. As they said in a blog post:

“The surprising fact is that our research was very straightforward. We used minor variations of the original attack and were successful. This issue was hiding in plain sight. This means neither the vendors of the affected products nor security researchers have investigated this before, although it's a very classic and well-known attack.”

These researchers sent their findings to vulnerable sites before going public so that a patch could be created.

Having a comprehensive understanding of the threats that are poised to damage your business will greatly help you keep it secured. We can help. For more information, reach out to Decatur Computers Inc. today at 217-475-0226.

ALERT: Your Business’ Infrastructure May Be Suscep...
Tip of the Week: Don’t Let Your Old Android Device...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 18 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Privacy Best Practices Hackers IT Support Network Security Business Computing Cybersecurity Small Business Managed IT Services Malware User Tips Ransomware Google Android Backup Email Business Management Windows 10 Efficiency Phishing Communications Software Data Technology IT Management Cloud Smartphone Artificial Intelligence Internet Hard Drive Update Hardware Outsourced IT Productivity Gadgets Antivirus Bitcoin Microsoft Office Microsoft Data Backup Start Menu Law Enforcement Passwords Mobile Device Management Word Digital Browser Gmail Cost Management Collaboration Patch Management Scam Data Management Network Saving Money Holiday App Computer BDR Business Continuity Alert Business Project Management Access Control IT Services Data Recovery Windows Data Security Office 365 Encryption SaaS Server Money Facebook Search Touchscreen Save Money Password Mouse Computer Care Upgrades Google Calendar eWaste Business Technology Spam Social Engineering Unified Threat Management Blockchain Running Cable Document Management Outlook Robot Disaster Vendor Mangement Solid State Drive WiFi Excel Telephone Systems Access Cabling IT Support Google Docs Vulnerabilities Business Mangement SharePoint Wireless Unified Communications Websites Tip of the week Laptop Consultant Spyware Managed IT Services Budget Redundancy Computing Infrastructure Knowledge Uninterrupted Power Supply Distributed Denial of Service Disaster Recovery Printing Software as a Service Tablet Analytics Worker Smartphones Networking Tech Terms Data Protection Freedom of Information Innovation Government Cortana How to Business Cards Cloud Computing Samsung Comparison Google Drive History News Unified Threat Management Automation Legal Virus Virtual Assistant Big Data Apps Managed Service Provider Google Maps Telephony IBM Fake News Cybercrime Hosted Solutions Automobile Downloads Mobile Device YouTube Emergency VoIP Best Practice Employer-Employee Relationship VoIp VPN Hard Drive Disposal Settings Specifications Vulnerability Audit Microsoft Excel Unsupported Software Mobility Operating System email scam Administration DDoS Television Social Media Maintenance Time Management Cryptocurrency Corporate Profile Remote Monitoring Managed IT Mobile Devices Windows 10 Marketing Office Users Office Tips CrashOverride

Latest Blog

It’s just good business to hand out your business card to prospective clients, and it has been for a very long time. As far back as the Renaissance, special guests were announced with name cards that displayed who the guest was and what types of greetings were due. It wasn’t...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.