Heart Bleed Bug Test Update: Flaw in Open SSL Patch Found By Hackers? Or Is It a Scam?

Five hackers recently claimed that they had found a loophole in the new Open SSL software acting as a patch for websites affected by the Heartbleed virus.

The group, who posted the news in Pastebin recently, said they were not releasing the code publicly for free but for a price of 2.5 bitcoins or $870.

"We have just found vulnerability in the patched version OpenSSL.  This exploit will not get public and will remain private, we have coded the script in python, and we will use our own code for a long time before this gets patched," they claimed. 

According to the report, the hackers are able to retrieve 64 KB of data chunks from various servers.

The code is offered to pentesters or penetration testers whose goal is to work around specific computer systems to find or identify its vulnerabilities.  Computer magazine PC World, in response to the news, said that the claim is most likely a scam.

PC World blogger Jeremy Kirk wrote, "In March, it was used in a Pastebin posting advertising a trove of data from Mt. Gox, the defunct Tokyo-based bitcoin exchange that was hacked." 

He said that responses to such advertisements are prone to credit card theft as well as compromise on CryptoAve data, a virtual currency exchange program that is targeted by hackers.

Security software company, TrendMicro, previously stated that only 10% of the world's total websites are believed to be vulnerable to Heartbleed.  Major companies like as Google, Facebook, Yahoo, and Paypal have applied the patch and are proven to now be safe from the bug.