Skip to main content

Did the NSA exploit the Heartbleed bug for years?

usa freedom act passes in senate with 67 32 vote nsa computers heartbleed bug
Image Credit: Wikimedia

The Office of the Director of National Intelligence (ODNI) flat-out denied reports that the National Security Agency had been quietly exploiting a widespread flaw in Internet security called the Heartbleed bug for years, as reported by Bloomberg news on Friday — accusations that sent shock waves of concern and frustration through Internet users.

“The Federal government was not aware of the recently identified vulnerability in OpenSSL until it was made public in a private sector cybersecurity report,” reads an official statement posted Friday to a blog maintained by the government agency. “If the Federal government, including the intelligence community, had discovered this vulnerability prior to last week, it would have been disclosed to the community responsible for OpenSSL.”

The alarming Bloomberg report claimed that the country’s top spy agency had discovered the security vulnerability shortly after it emerged, and has routinely used it to collect data and spy (likely on Americans, intentionally or otherwise). Data sucked up by the NSA using the Heartbleed bug could have included email addresses, passwords and other data that would have let the agency carry on its cyber-espionage operations.

MORE: Here’s a list of websites allegedly affected by the Heartbleed bug

The longer a flaw like Heartbleed existed on the Internet, the more opportunity there was for criminals and enemy states to exploit it to steal information, spy on others and cause incalculable harm to individuals, businesses and government agencies, explained noted security analyst Graham Cluley.

“If it’s true … then they’ve let down everyone who uses the Internet.”

“If it’s true that the NSA knew about the Heartbleed bug, but didn’t tell anyone about it, then they’ve let down everyone who uses the Internet — both around the globe, as well as the law-abiding citizens they are supposed to protect in the United States,” Cluley told Digital Trends.

One of the NSA’s main missions is national security. That includes seeking out software flaws and vulnerabilities that could be exploited by hackers and other governments. The agency’s actions with respect to how it used the Heartbleed bug, and its refusal to inform the public of its existence, would have run contrary to those missions, some say.

“It flies in the face of the agency’s comments that defense comes first,” said Jason Healey, director of the Atlantic Council’s cyber statecraft initiative, and a former Air Force cyber officer. “They are going to be completely shredded by the computer security community for this.”

The NSA first addressed the Bloomberg report in a statement issued via Twitter:

The ODNI statement stressed the same point, noting that “it is in the national interest to responsibly disclose the vulnerability rather than to hold it for an investigative or intelligence purpose.” Yet many still questioned the agency. The Electronic Freedom Foundation (EFF), a non-profit dedicated to protecting Americans’ civil liberties, wrote the following tweet in response:

A handful of programmers runs the OpenSSL security protocol in which the Heartbleed bug lies; the NSA tasks thousands with discovering such vulnerabilities. Once the flaw was uncovered, the Bloomberg report claimed, the NSA essentially put it in its back pocket, instead of warning those who could have patched the problem and kept the nation’s data safe — a part of the agency’s stated mission.

MORE: How to check if your favorite websites are vulnerable to the Heartbleed bug

“The Information Assurance mission confronts the formidable challenge of preventing foreign adversaries from gaining access to sensitive or classified national security information,” the agency’s mission statement reads.

James Lewis, a senior fellow at the Center for Strategic and International Studies specializing in cybersecurity, says that the NSA considers multiple options when it discovers vulnerabilities like Heartbleed. They include temporary exploitation combined with collaboration with software developers to plug the flaw.

MORE: What is the Heartbleed bug?

“They actually have a process when they find this stuff that goes all the way up to the director” of the NSA, Lewis said. “They look at how likely it is that other guys have found it and might be using it, and they look at what’s the risk to the country.”

NSA operations-center
National Security Operations Center (credit: Wikipedia) Wikipedia

The Heartbleed bug is a serious vulnerability in the OpenSSL Internet encryption protocol known that has potentially left the information of most Internet users vulnerable to hackers. The Heartbleed bug reportedly affects as much as 66 percent of the world’s active websites, and has existed for roughly two years. That’s according to a team of Codenomicon researchers, as well as Google Security researcher Neel Mehta.

“We’ve never seen any quite like this,” Michael Sutton, vice president of security research at Zscaler, a security firm, says. “Not only is a huge portion of the Internet impacted, but the damage that can be done, and with relative ease, is immense.”

MORE: The Heartbleed bug affects “almost everyone”

The NSA has been embroiled in controversy and scandal since it was revealed that the agency actively collects data and spies on a vast array of Internet users, including unaware Americans.

Konrad Krawczyk
Former Digital Trends Contributor
Konrad covers desktops, laptops, tablets, sports tech and subjects in between for Digital Trends. Prior to joining DT, he…
The best all-in-one printers you can buy in 2024
Canon's imageClass MF753Cdw has a quick, full-duplex ADF.

If you're shopping for the best printers for a home office, an all-in-one is a good choice. Multifunction printers include scanners to digitize receipts, invoices, and other documents. The scan and print functions combine to make copies. Some all-in-one printers can connect to a phone line to act like a fax machine.

Multifunction printers are like the smaller cousins of the bulkier copiers you might see at the office. As our printer buyers' guide points out, an all-in-one printer usually costs less than it would to buy a printer and scanner separately. Here are some of the best multifunction printers on the market today.

Read more
Asus pits AMD’s performance against Intel’s efficiency
Asus ProArt PX13 front view showing display and keyboard.

Several new laptops chipsets have been introduced lately in response to Microsoft's Copilot+ PC AI initiative. They sport faster neural processing units (NPUs) to speed up on-device AI processing and make it more efficient, but they're not precisely the same. AMD's Ryzen AI 9 chipsets are aimed at overall performance, while Intel's Lunar Lake is aimed at efficiency.

The Asus ProArt PX13 is one of the first with AMD's chipset, and it's a highly portable 13-inch laptop. The Asus Zenbook S 14 is aimed at great battery life in a thin-and-light design using Lunar Lake. Both are some of the best laptops you can buy today, but which laptop is the better choice?
Specs and configurations

Read more
Nvidia might finally fix its VRAM problem — but it will take time
The Razer Blade 14 and 18 on a table.

It's no secret that some of Nvidia's best graphics cards could use a little more VRAM. According to a new leak, Nvidia may be addressing that problem in a big way -- at least in laptops. The RTX 5090 laptop GPU is now reported to come with 24GB VRAM across a 256-bit memory bus. The downside? These new laptops might not make it to market as soon as we'd hoped.

The information comes from Moore's Law Is Dead, who cites his own industry sources as he spills the beans on RTX 50-series laptop specs. Up until now, we've not heard much about Nvidia's plans for RTX 50 laptops, indicating that they might be a few months away. The YouTuber agrees with this, saying that Nvidia might be targeting a launch window in the first or second quarter of 2025. This might not affect the entire lineup, though.

Read more