{"id":37044,"date":"2020-09-09T23:01:37","date_gmt":"2020-09-09T23:01:37","guid":{"rendered":"http:\/\/842deb89-39fd-4986-a42a-a6bbbf1ec4bd"},"modified":"2020-09-09T23:01:37","modified_gmt":"2020-09-09T23:01:37","slug":"raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/","title":{"rendered":"Raccoon attack allows hackers to break TLS encryption &#8216;under certain conditions&#8217;"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/09\/09\/3ce683ee-ba17-4722-b50f-8eb5272f1635\/racoon-attack.png\" class alt=\"Racoon Attack\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Merget et al. <\/span><\/figcaption><\/figure>\n<p>A team of academics has disclosed today a theoretical attack on the TLS cryptographic protocol that can be used to decrypt the HTTPS connection between users and servers and read sensitive communications.<\/p>\n<p>Named&nbsp;<strong>Raccoon<\/strong>, the attack has been described as &#8220;<em>really hard to exploit<\/em>&#8221; and its underlying conditions as &#8220;<em>rare<\/em>.&#8221;<\/p>\n<h2>How the Raccoon attack works<\/h2>\n<p>According to a paper published today, the Raccoon attack is, at its base, a&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Timing_attack\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">timing attack<\/a>, where a malicious third-party measures the time needed to perform known cryptographic operations in order to determine parts of the algorithm.<\/p>\n<p>In the case of a Raccoon attack, the target is the Diffie-Hellman key exchange process, with the aim being to recover several bytes of information.<\/p>\n<p>&#8220;In the end, this helps the attacker to construct a set of equations and use a solver for the Hidden Number Problem (HNP) to compute the original premaster secret established between the client and the server,&#8221; the research team explained.<\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/\" class=\"lazy\" alt=\"raccoon-attack-overview.png\" data-original=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/09\/09\/310df64f-0f74-4383-a08b-2503d86813f8\/raccoon-attack-overview.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/09\/09\/310df64f-0f74-4383-a08b-2503d86813f8\/raccoon-attack-overview.png\" class alt=\"raccoon-attack-overview.png\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Merget et al. <\/span><\/figcaption><\/figure>\n<p>According to the researchers, all servers that use the Diffie-Hellman key exchange in setting up TLS connections are vulnerable to attacks.<\/p>\n<p>This is a server-side attack and cannot be performed on a client, such as browsers. The attack also needs to be executed for each client-server connection in part, and cannot be used to recover the server&#8217;s private key and decrypt all connections at once.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>Servers that use the Diffie-Hellman key exchange and TLS 1.2 and below are considered vulnerable.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Datagram_Transport_Layer_Security\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">DTLS<\/a>&nbsp;is also impacted.<\/p>\n<p>TLS 1.3 is considered safe.<\/p>\n<h2>Not a practical attack<\/h2>\n<p>But despite having the capability to decrypt TLS sessions and read sensitive communications, the research team was also the first to admit that the Raccoon attack was also extremely hard to pull off.<\/p>\n<p>For starters, the attack requires that certain and extremely rare conditions be met.<\/p>\n<p>&#8220;The vulnerability is really hard to exploit and relies on very precise timing measurements and on a specific server configuration to be exploitable,&#8221; researchers said.<\/p>\n<p>&#8220;[The attacker] needs to be close to the target server to perform high precision timing measurements. He needs the victim connection to use DH(E) and the server to reuse ephemeral keys. And finally, the attacker needs to observe the original connection.<\/p>\n<p>&#8220;For a real attacker, this is a lot to ask for,&#8221; academics said.<\/p>\n<p>&#8220;However, in comparison to what an attacker would need to do to break modern cryptographic primitives like AES, the attack does not look complex anymore.<\/p>\n<p>&#8220;But still, a real-world attacker will probably use other attack vectors that are simpler and more reliable than this attack,&#8221; researchers added.<\/p>\n<p>While the attack has been deemed hard to exploit, some vendors have done their due diligence and released patches.&nbsp;<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1596\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Microsoft<\/a>&nbsp;(CVE-2020-1596),&nbsp;<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-12413\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Mozilla<\/a>,&nbsp;<a href=\"https:\/\/www.openssl.org\/news\/secadv\/20200909.txt\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">OpenSSL<\/a>&nbsp;(CVE-2020-1968), and&nbsp;<a href=\"https:\/\/support.f5.com\/csp\/article\/K91158923\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">F5 Networks<\/a>&nbsp;(CVE-2020-5929) have released security updates to block Raccoon attacks.<\/p>\n<p>Additional technical details are also available on a&nbsp;<a href=\"https:\/\/raccoon-attack.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">dedicated website<\/a>&nbsp;and in a research paper titled &#8220;<em>Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles inTLS-DH(E)<\/em>&#8221; [<a href=\"https:\/\/raccoon-attack.com\/RacoonAttack.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">PDF<\/a>].<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Raccoon attack is described as &#8220;really hard to exploit&#8221; and its conditions as &#8220;rare.&#8221;<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37045,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-37044","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Raccoon attack allows hackers to break TLS encryption &#039;under certain conditions&#039; 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Raccoon attack allows hackers to break TLS encryption &#039;under certain conditions&#039; 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-09T23:01:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Raccoon attack allows hackers to break TLS encryption &#8216;under certain conditions&#8217;\",\"datePublished\":\"2020-09-09T23:01:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\\\/\"},\"wordCount\":521,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\\\/\",\"name\":\"Raccoon attack allows hackers to break TLS encryption 'under certain conditions' 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions.png\",\"datePublished\":\"2020-09-09T23:01:37+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions.png\",\"width\":1000,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Raccoon attack allows hackers to break TLS encryption &#8216;under certain conditions&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Raccoon attack allows hackers to break TLS encryption 'under certain conditions' 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/","og_locale":"en_US","og_type":"article","og_title":"Raccoon attack allows hackers to break TLS encryption 'under certain conditions' 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-09-09T23:01:37+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Raccoon attack allows hackers to break TLS encryption &#8216;under certain conditions&#8217;","datePublished":"2020-09-09T23:01:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/"},"wordCount":521,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/","url":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/","name":"Raccoon attack allows hackers to break TLS encryption 'under certain conditions' 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions.png","datePublished":"2020-09-09T23:01:37+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions.png","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Raccoon attack allows hackers to break TLS encryption &#8216;under certain conditions&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37044"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37044\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37045"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}