LinkedIn called out on slow implementation of default SSL

Zimperium said some users are at risk, but LinkedIn claims the issue doesn't affect the majority of users

LinkedIn said it is making progress implementing default encryption of data exchanged with its users after a security company alleged some users are still at risk of account takeovers.

San Francisco-based Zimperium, a mobile security company, wrote on its blog on Wednesday that it is still possible to hijack some LinkedIn users' account networks using a technique called SSL stripping.

The technique involves a man-in-the-middle attack where a hacker is watching a victim's Internet traffic, which is possible in public places such as a coffee shop where the victim is connected to a Wi-Fi hotspot.

When a person attempts a SSL (Secure Sockets Layer) encrypted connection, the attacker "strips" out the https attempt, replacing it with an http connection, enabling the collection of the person's authentication credentials.

The attack is possible against LinkedIn because it doesn't fully encrypt an entire user's session over SSL. LinkedIn always initiates an SSL connection when a person submits their login credentials, but in some regions of the world, flips the connection to an unencrypted one over http.

LinkedIn said in December it was in the process of making all user sessions fully encrypted. That work isn't quite done yet, although last week it said all traffic served to U.S. and European users is now served by default over https. Since 2012, LinkedIn users have had the option of changing their security settings to full https, but many might not have known about the setting.

Moving to full https is no easy task, and LinkedIn described some of the challenges it was facing in a blog post in December. Among those issues were increased latency, support by various content delivery networks for https and scaling issues.

LinkedIn's upgrade is one many other services have made. Google offered full https connections as an option for Gmail in 2008, but two years later made it the default. Facebook moved its service to https by default in January 2011.

LinkedIn spokeswoman Nicole Leverich wrote via email that the issue described by Zimperium "does not impact the vast majority of LinkedIn members given our ongoing global release of https by default."

In the meantime, users should turn on full-site https by going into their settings, clicking on the "account" tab, then going to "manage security settings" and checking the appropriate box.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags Internet-based applications and servicessecurityZimperiumLinkedIninternet

Comments

Comments are now closed

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Cloud Security for Enterprise

Encrypt data with easy-to-use key management for virtual, private, and public cloud environments with Trend Micro SecureCloud™.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.