LinkedIn called out on slow implementation of default SSL

Zimperium said some users are at risk, but LinkedIn claims the issue doesn't affect the majority of users

LinkedIn said it is making progress implementing default encryption of data exchanged with its users after a security company alleged some users are still at risk of account takeovers.

San Francisco-based Zimperium, a mobile security company, wrote on its blog on Wednesday that it is still possible to hijack some LinkedIn users' account networks using a technique called SSL stripping.

The technique involves a man-in-the-middle attack where a hacker is watching a victim's Internet traffic, which is possible in public places such as a coffee shop where the victim is connected to a Wi-Fi hotspot.

When a person attempts a SSL (Secure Sockets Layer) encrypted connection, the attacker "strips" out the https attempt, replacing it with an http connection, enabling the collection of the person's authentication credentials.

The attack is possible against LinkedIn because it doesn't fully encrypt an entire user's session over SSL. LinkedIn always initiates an SSL connection when a person submits their login credentials, but in some regions of the world, flips the connection to an unencrypted one over http.

LinkedIn said in December it was in the process of making all user sessions fully encrypted. That work isn't quite done yet, although last week it said all traffic served to U.S. and European users is now served by default over https. Since 2012, LinkedIn users have had the option of changing their security settings to full https, but many might not have known about the setting.

Moving to full https is no easy task, and LinkedIn described some of the challenges it was facing in a blog post in December. Among those issues were increased latency, support by various content delivery networks for https and scaling issues.

LinkedIn's upgrade is one many other services have made. Google offered full https connections as an option for Gmail in 2008, but two years later made it the default. Facebook moved its service to https by default in January 2011.

LinkedIn spokeswoman Nicole Leverich wrote via email that the issue described by Zimperium "does not impact the vast majority of LinkedIn members given our ongoing global release of https by default."

In the meantime, users should turn on full-site https by going into their settings, clicking on the "account" tab, then going to "manage security settings" and checking the appropriate box.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the CSO newsletter!

Error: Please check your email address.

Tags Internet-based applications and servicesZimperiumsecurityLinkedIninternet

More about FacebookGoogle

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jeremy Kirk

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place