Last week, the Heartbleed bug made international news when it was discovered that many major organizations were identified as vulnerable, including Yahoo, Facebook, Tumblr, and Amazon Web Services.
To be brief, the bug involved OpenSSL, a security device that has been in widespread use for years to protect data stored on servers, such as login credentials and user information. The bug in the software may allow malicious users to get servers using a specific version of OpenSSL to release data that the server was holding in memory. Again, this data often contains a log of user credentials that had recently been used.
As soon as the exploit was announced, our engineers began to go through every server on the MegaNet network to verify the version of OpenSSL in use (if applicable), and to patch any servers that might have been using the affected versions of OpenSSL.
At this point in time, we can safely say that none of the servers on the MegaNet network were affected by the Heartbleed bug; none of our users potentially had any data compromised. All of our servers were running versions of OpenSSL prior to the one affected. These servers include:
- All web servers
- All residential email servers and business email servers (including IMAIL and dedicated managed servers)
- All Voice over IP authentication servers
- All spam filtering servers
Our engineers and Network Operations Center will continue to monitor developments on the OpenSSL patches, as well as any other potential security issues that may impact our services and customers.
We thank you for your continued support and business, and we will always work to provide you with the most secure services possible.
If you have any questions, please feel free to contact us by using our web contact forms, or by calling us toll free 877-634-2638 (877-MEGANET).