French researchers develop ‘Sweet32’ attack on 64-bit block ciphers. Attackers can take authentication cookies from HTTPS-protected traffic using triple-DES (3DES) and Blowfish. Attack highlights why it is necessary for sites to stop using legacy cipher and upgrade to modern, more secure ciphes. Attacker can target a victim’s authentication cookie by luring them to a malicious site and injecting JavaScript into the victim’s browser and injecting the cookie. The majority of OpenVPN connections and between 1 percent and 2 percent of the Internet’s traffic may be susceptible to Sweet32.”]

