Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

Back in 1998, researcher Daniel Bleichenbacher found what is being called the ROBOT exploit in the secure sockets layer (SSL) encryptions that protect web-based platforms. There is a flaw in an algorithm that is responsible for the RSA encryption key--through specially constructed queries its error messages divulge enough information that after a short time they were able to decrypt ciphertext without the dedicated key for that encryption. In response, SSL architects created workarounds to limit error messages rather than eliminating the faulty RSA algorithm.

Referred to as an “Oracle” by researchers, the crypto-vulnerability provides only decisive yes and no answers, which allows people that form their queries a certain way to eventually retrieve detailed information about the contents of encrypted data. This is called an “adaptive chosen-ciphertext attack”.

Recently, researchers have found that over a quarter of the 200 most-visited websites essentially have this vulnerability, and about 2.8 percent of the top million. Facebook, the most visited website in the world for 2017, is one; while the money transfer platform PayPal is another. The explanation researchers gave was that with so much time focusing on the newest and baddest malware and exploits, this tried and true vulnerability has just been neglected. In a blog post they said as much:

“The surprising fact is that our research was very straightforward. We used minor variations of the original attack and were successful. This issue was hiding in plain sight. This means neither the vendors of the affected products nor security researchers have investigated this before, although it's a very classic and well-known attack.”

The vulnerability, now called ROBOT, an acronym for “Return of Bleichenbacher's Oracle Threat” was tested, with the findings being sent to the vulnerable sites to ensure they could get a patch created before the researchers went public with it.

Understanding the threats that are being used against businesses can go a long way toward helping you keep yours secure. For more information about the ROBOT vulnerability or what we can do to keep your company’s network secure, contact Voyage Technology today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Email Google Computer Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Holiday Facebook Artificial Intelligence Automation Miscellaneous Compliance Cloud Computing Covid-19 Training Gadgets Outsourced IT Server Managed Service Provider Remote Work IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Apps Data Security Mobile Office Vendor Two-factor Authentication Managed Services Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Gmail Chrome WiFi Tip of the week Budget Voice over Internet Protocol Managed IT Services How To Hacker BDR Avoiding Downtime Computing Marketing Information Technology HIPAA Physical Security Applications Office 365 Access Control Conferencing Healthcare Computers Operating System 2FA Website Risk Management Router Virtual Private Network Analytics Office Tips Health Augmented Reality Help Desk Big Data Storage Password Bring Your Own Device Retail Telephone Scam Data loss Customer Service Going Green Cooperation Free Resource Project Management Windows 7 Windows 11 Patch Management Save Money Microsoft 365 Cybercrime Remote Monitoring End of Support Vulnerability Vendor Management Solutions Excel Firewall Display Printer Paperless Office Infrastructure Monitoring The Internet of Things Document Management Social Managed IT Service Remote Workers Maintenance Administration Downloads Antivirus Customer Relationship Management iPhone Licensing Entertainment Hacking Vulnerabilities Presentation Images 101 Settings Wireless Wireless Technology Printing Multi-Factor Authentication Robot Mobility Content Filtering Telephone System Cost Management YouTube Supply Chain Cryptocurrency IT Management Word Meetings VPN Employees Integration Virtual Desktop Modem LiFi User Tip Data storage Processor Computer Repair Mobile Security Holidays Safety Outlook Data Storage Money Humor Smart Technology Video Conferencing Data Privacy Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Sports Mouse Download Net Neutrality Mobile Computing Twitter Alerts SQL Server Vendors Search Be Proactive Financial Data Error History Connectivity IT Best Practice Social Engineering Break Fix Workforce Browsers Smartwatch Threats Upload Procurement Competition Remote Computing Azure Buisness IT solutions Multi-Factor Security Tech Workplace Strategies Social Network Telework Legal Cyber security CES Tablet IoT Communitications Business Growth Dark Web Meta Amazon Trends Supply Chain Management Alert File Sharing Regulations User Dark Data Google Calendar Term Cortana Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment Alt Codes How To Microsoft Excel Outsource IT Environment Media Gamification Flexibility Notifications Staff Value Downtime Travel Social Networking Hosted Solution Legislation Organization IP Address Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Typing Small Businesses Displays Content Remote Working Wearable Technology Memory Unified Threat Management Motherboard Data Breach Recovery Comparison Google Play Knowledge Health IT Google Drive Unified Threat Management Directions Videos Assessment Electronic Health Records Hard Drives Permissions Outsourcing 5G Domains Wasting Time Trend Micro Unified Communications Network Congestion Specifications Security Cameras Experience Workplace Google Docs User Error Microchip Internet Exlporer Software as a Service Refrigeration Bitcoin Fraud Running Cable Hiring/Firing Paperless Username Public Speaking Google Wallet Managing Costs Point of Sale eCommerce Black Friday SSID Co-managed IT Lithium-ion battery Database Surveillance Windows 8 Virtual Assistant Entrepreneur Laptop Technology Care Business Communications Network Management Drones Tech Support IT Technicians Virtual Machine Cookies Monitors Cyber Monday Medical IT Scams Proxy Server Reviews Tactics Development Undo Hotspot Transportation Halloween Hybrid Work Human Resources Websites Mirgation Hypervisor Nanotechnology Optimization PowerPoint Cables Shopping SharePoint Addiction Hacks Electronic Medical Records Language Employer/Employee Relationships Scary Stories Navigation Fun Google Apps Management PCI DSS Chatbots Screen Reader Application Deep Learning Writing Distributed Denial of Service IT Maintenance Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Business Intelligence Education Evernote Shortcuts Server Management Regulations Compliance IBM Private Cloud Identity Identity Theft Smart Tech Memes Ransmoware Superfish Bookmark

Blog Archive