Hackers may have stolen over 200 SSL certs

Status
Not open for further replies.

bfdd

Lifer
Feb 3, 2007
13,312
1
0
http://www.computerworld.com/s/article/9219663/Hackers_may_have_stolen_over_200_SSL_certificates
article said:
Hackers may have obtained more than 200 digital certificates from a Dutch company after breaking into its network, including ones for Mozilla, Yahoo and the Tor project, a security researcher reported today.

The count is considerably higher than DigiNotar has acknowledged. Earlier this week, a company spokesman said that "several dozen" certificates had been acquired by the attackers.

"About 200 certificates were generated by the attackers," said Hans Van de Looy, principal security consultant and founder of Madison Gurka, a Dutch security company, citing a source he said wished to remain confidential.

Among the certificates acquired by the attackers in a mid-July hack of DigiNotar, Van de Looy's source said, were ones valid for mozilla.com, yahoo.com and torproject.org.

ouch, bad news for yahoo lols. wonder if anyone is going to claim ownership of this.
 
May 11, 2008
22,669
1,482
126
http://www.computerworld.com/s/article/9219663/Hackers_may_have_stolen_over_200_SSL_certificates


ouch, bad news for yahoo lols. wonder if anyone is going to claim ownership of this.

Yes unfortunately. This was in the news last weekend in the Netherlands. The contract with the company diginotar has been terminated immediately.

At the moment the dutch government is encouraging not to use the digital services provided by the government. :\

Most certificates have been replaced. Others that are not replaced, well the browser will present a message that the security certificate for the site is no longer valid.
 
May 11, 2008
22,669
1,482
126
The company diginotar seems to have been hacked several times before the latest one claimed by Comodohacker.
 
May 11, 2008
22,669
1,482
126
Here you go, for the interested :

http://arstechnica.com/security/new...i-hacked-diginotar-too-other-cas-breached.ars

The hack of Dutch certificate authority DigiNotar already bore many similarities to the break-in earlier this year that occurred at a reseller for CA Comodo. Bogus certificates were issued for webmail systems, which were in turn used to intercept Web traffic in Iran. Another similiarity has since emerged: the perpetrator of the earlier attacks is claiming responsibility for the DigiNotar break-in.

Calling himself ComodoHacker, the hacker claims that DigiNotar is not the only certificate authority he has broken into. He says that he has broken into GlobalSign, and a further four more CAs that he won't name. He also claimed that at one time he had access to StartCom.

The statement did not provide any specific details about how the hack was performed, offering only a high-level description of some of the things he did: he found passwords, used 0-day exploits, penetrated firewalls, and bypassed the cryptographic hardware that DigiNotar was using to gain remote access to machines. He said that a more detailed explanation would follow, when he had the time, and that it would serve as useful guidance for Anonymous and LulzSec. While lacking in detail, the hacker did include an Administrator-level username and password apparently used on DigiNotar's network. DigiNotar has not confirmed the authenticity of this information.

As with the statements issued after the Comodo hack, the DigiNotar statement was clear about one thing: the sophistication of the hack and the great skill it took.

ComodoHacker also justifed his attack on the Dutch certificate authority by blaming the Dutch for the murder of 8,000 muslims at Serbian hands in Srebrenica; "It's enough for Dutch government for now, to understand that 1 Muslim soldier worth 10000 Dutch government."

Meanwhile, the fallout from the hack continues. DigiNotar has, in effect, lost its status as a trusted root certificate authority. Its certificates have been blacklisted by Microsoft, Google, Mozilla, and Apple.

This is having some significant consequences for Dutch Internet users. Certificates issued by DigiNotar are used by the Dutch government, forcing the government to warn that it can no longer ensure the integrity of secure connections to its own websites. The government is now overseeing DigiNotar's operations as the certificate authority attempts to learn the full scope of the attacks. Since taking over, the government has issued a list of more than 500 fradulent certificates issued by DigiNotar.

Among these are certificates for *.*.com and *.*.org, which would allow someone in possession of the certificates to perform man-in-the-middle attacks for almost any site with a .com or .org domain—a far wider problem than initially assumed. The Tor Project has also discovered some unusual text in one of the certificates. It contains a number of phrases written in Farsi, which translate as "great cracker," "I will crack all encryption," and "I hate/break your head." This alludes to ComodoHacker's statement about the Comodo hack, in which he claimed to be able to break strong encryption.

There's also increasing evidence that the certificates were used widely within Iran. Trend Micro's Smart Protection Network collects many kinds of data, including domain name lookups. Over the past few weeks, the number of Iranian systems looking up DigiNotar's validation.diginotar.nl domain was far higher than normal, until it abruptly dropped on August 30th. This activity implies that with large numbers of Iranian machines were performing revocation checks on the bogus DigiNotar certificates during July and August. The abrupt stop in turn implies that traffic to validation.diginotar.nl has now been blocked within Iran.

This suggests that the number of man-in-the-middle attacks performed against Iranians was substantial, and that the attacks occurred over many weeks, making secure communication insecure for all those within Iran. After the Comodo hack, ComodoHacker made clear that he was deliberately acting to thwart anti-government dissidents within Iran. In spite of his criticism of the Dutch, the true target remains the Iranian people.

The implications for the certificate authority system remain uncertain. Both the Comodo and DigiNotar hacks demonstrate the considerable, and well-known, problems with the current system: certificates from a trusted authority are accepted unconditionally, and there are many such authorities, and their integrity cannot be assured. DigiNotar compounded the problems by being far from forthcoming about the nature and extent of the hack, a situation that has only improved since the Dutch government got involved. In contrast, Comodo was quick to notify browser vendors to notify them of the problem.

There are proposals such as DNSSEC, to make domain name information secure; CAA records, to allow DNS to denote that a domain should only accept certificates issued by particular certificate authorities; and DANE, to allow dissemination of certificates over DNS, that would go some way toward preventing similar attacks in the future. There are also systems that move away from absolutely trusted certificate authorities in favor of consensus-based trust. Such systems would both make it harder to perform man-in-the-middle attacks, and reduce the impact of certificate authority compromises. However, little action has been taken to make these systems a practical reality, as both require substantial changes to be made to the way DNS and certificates are issued and used.

A number of browser-based stopgap solutions are being devised to partially fill this gap. Certificate Patrol for Firefox provides alerts if a certificate has changed unexpectedly, which would reveal the use of fraudulent certificates. Convergence, also for Firefox, provides a kind of decentralized trust system instead of a fixed list of certificate authorities. Chrome's HTTPS pinning feature means that Chrome will only accept certificates issued by certain certificate authorities when visiting Google domains. This provides a kind of Google-specific, Chrome-specific equivalent to the CAA DNS proposal.

While these browser-based systems can protect users, they don't obviate the need for a more substantial overhaul of the entire certificate system. The DigiNotar hack demonstrates the need for change, but with considerable vested corporate interests in the current system—not to mention massive entrenchment—it could be a long time coming.
 

Rainsford

Lifer
Apr 25, 2001
17,515
0
0
From a security standpoint, the whole SSL CA system is ridiculously stupid. The security of the entire system can never be greater than the security of the least secure CA. Despite the fact that the only CA that got hacked is some podunk Dutch CA that nobody's ever heard of, that hack could be used to issue a fake certificate for ANY website out there.

The problem is that nothing makes a particular CA authoritative for a domain. So even if I choose the best, most secure CA out there, you can get a fake certificate for my domain from Billy-Bob's CA that you hacked into and nobody can tell mine is any more authentic than yours. This makes the whole system pretty weak, and doesn't provide a lot of economic incentive for CAs to compete on security.

The incentive all comes from website users and the browser makers, who can choose not to trust a particular CA if they really want. It would work much better if the website operator was able to lean on CAs to be more secure, since they're the ones that can shop around and vote with their dollars.
 

bfdd

Lifer
Feb 3, 2007
13,312
1
0
Yes unfortunately. This was in the news last weekend in the Netherlands. The contract with the company diginotar has been terminated immediately.

At the moment the dutch government is encouraging not to use the digital services provided by the government. :\

Most certificates have been replaced. Others that are not replaced, well the browser will present a message that the security certificate for the site is no longer valid.

If you look at the date of my post, it took about a week for someone to reply :)
 

bfdd

Lifer
Feb 3, 2007
13,312
1
0
Indeed. You are right. Had not seen it and assumed that no new thread in P&N is left unanswered (for a week :eek:). Amazing. :)

I thought so too because this is kind of a big deal. This has happened on to big of a scale multiple times recently that people are really going to have to start rethinking this system we use. Also, what should be done or how these hacks/thefts should be treated.
 

0roo0roo

No Lifer
Sep 21, 2002
64,795
84
91
Not sure why it was posted in p&n rather than ot or security...

I only found it by search.
 

Kadarin

Lifer
Nov 23, 2001
44,296
16
81
Everyone should make sure DigiNotar is no longer a trusted CA in their browsers.
 

Double Trouble

Elite Member
Oct 9, 1999
9,270
103
106
From a security standpoint, the whole SSL CA system is ridiculously stupid. The security of the entire system can never be greater than the security of the least secure CA. Despite the fact that the only CA that got hacked is some podunk Dutch CA that nobody's ever heard of, that hack could be used to issue a fake certificate for ANY website out there.

The problem is that nothing makes a particular CA authoritative for a domain. So even if I choose the best, most secure CA out there, you can get a fake certificate for my domain from Billy-Bob's CA that you hacked into and nobody can tell mine is any more authentic than yours. This makes the whole system pretty weak, and doesn't provide a lot of economic incentive for CAs to compete on security.

The incentive all comes from website users and the browser makers, who can choose not to trust a particular CA if they really want. It would work much better if the website operator was able to lean on CAs to be more secure, since they're the ones that can shop around and vote with their dollars.

I agree completely. It makes no sense to put the trust of the entire internet on a series of more than 600 companies, some of whom obviously will not as secure as others. There has to be a better way to do this stuff.....
 
Status
Not open for further replies.