News of the OpenSSL Heartbleed bug, which has emerged over the last 48 hours, is arguably one of the most significant developments in the history of the security industry. The likes of Target, Sony and TK Maxx have all made waves over the past few years, but whereas these were all incidents of a single company being breached, OpenSSL Heartbleed has potentially affected millions of websites.

OpenSSL is the technology behind the TLS/SSL protocol (or padlock icon) that many of us take as a sign of trustworthiness and reputability when browsing the internet. The OpenSSL Heartbleed bug allows unauthorised users to extract data from the server’s memory, 64,000 characters of it to be precise. This could contain usernames, passwords, secure keys or even credit card information.

What is perhaps most shocking about this development is the fact that it was discovered a whole two years ago. The TLS/SSL protocol is known to stop or slow down intelligence agencies and this seemingly accidental loophole could provide a very useful workaround. Which poses the question, who else could have known about this for the past two years?

Government Involvement

As the name suggests, OpenSSL is an open source technology. This means that the source code is freely available to download and modify, with no permission required. Open source software is generally considered to be more private, since it is usually developed for non-profit reasons without any government licensing (which has backdoor theories).

It is alleged that RSA was bribed by the NSA to reduce their encryption strength. There have also been rumours of similar attempted bribery from a certain American giant and a small English outfit, although neither story has hit the press. But regardless, is it possible that a government agency could have encouraged the implementation of the bug – either financially or otherwise?

Black Market Trades

The dark web is a non-indexed section of the internet, only available through certain secure browsers and home to many criminals. Fraudsters, hackers, drug dealers and even hit men will advertise their services for a hefty fee. Exploit kits and other viruses are available to purchase for the right price, somewhat ironically with free technical support.

Zero day exploits, which are unknown flaws, are available – but only to the highest bidder. Is it possible that an organised criminal gang or a government agency purchased this bug to exploit a specific target?

Did The Government Know About This?

News of the OpenSSL Heartbleed bug spread like wildfire on April 7th. This means that hundreds of people have most likely tried to exploit the flaw already. But again, we must ask, who knew about the bug already? Both Google and Finnish security outfit Codenomicon are taking credit for discovering the bug, but were they the first?

Our world is home to many security research groups, both ethical and black hat, not to mention well-funded government research labs. With the news of Edward Snowden fresh in our minds, the question remains – if the NSA or GCHQ knew about the OpenSSL Heartbleed bug, would they have actually told us?