BEAST is an exploit developed by security researchers to break the encryption used by most browsers and websites Data encryption is the cornerstone of Internet security. Every time you log into your email account or sign into an online retailer like Amazon, chances are that your browser is establishing a secure connection to the server using an encryption technology called TLS (Transport Layer Security).First developed in 1999 as an improvement over SSL (Secure Socket Layer) 3.0 encryption, TLS 1.0 is used as part of HTTPS encryption and is now the Web standard for data encryption. Almost all websites and browsers use TLS to secure information being transferred between you and the site, and now security researchers Thai Duong and Juliano Rizzo claim to have cracked TSL 1.0 encryption using just a traffic sniffer and a simple bit of JavaScript code.Duong and Rizzo performed a live demonstration of the exploit, codenamed BEAST (Browser Exploit Against SSL/TLS), at the Ekoparty security conference in Buenos Aires during mid-September. While the details of the attack are highly technical, we now know it starts with a snippet of JavaScript code that infects your browser when you follow a suspicious link or visit a malicious website.When BEAST infects your browser, it monitors the data you exchange with encrypted websites. It inserts blocks of plain-text into the data stream and attempts to decrypt those known blocks of plain-text by making educated guesses about the encryption key. After enough time passes (roughly five to ten minutes, according to reports that Rizzo sent to The Register), BEAST inevitably guesses correctly and cracks the code on a bytes worth of encrypted data, then uses that data to reverse-engineer the encryption key and decrypt the confidential data in the session cookie stored on your computer.Its a time-consuming process that exploits a known vulnerability in SSL 3.0/TLS 1.0 encryption. Prior to their public demonstration, the researchers responsible notified the developers of popular browsers like Firefox and Internet Explorer, and hopefully, the publicity surrounding this vulnerability encourages more server and browser developers to upgrade their encryption systems to take advantage of more recent protocols like TLS 1.1 or 1.2, both of which remain theoretically immune to a block-wise chosen-plaintext attack like BEAST. Microsoft has already promised to patch Windows to protect users against BEAST, and Kaspersky Lab Expert Kurt Baumgartner believes Chrome users have little to worry about as the Chromium source code was patched to protect against this exploit three months ago. Thats possible because TLS 1.1 has been available since 2006, yet most websites and browsers do not support it due to the time and effort required to update all of their services (like browser extensions in Chrome or the Facebook Connect API) to authenticate data using a different encryption method. Until they do, the only surefire way to protect yourself against an exploit like BEAST is to avoid malware by developing safe browsing habits. Never open unsolicited mail or click on links you dont trust, be careful about the data you share on social networks and change your passwords often. Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe