Posted by Virus Bulletin on Sep 5, 2011
Fake certificates signed for CIA, Mossad, Google, Facebook.
It is likely that Iranian Internet users have been spied on following a hack discovered at Dutch certificate authority (CA) DigiNotar last week, according to Trend Micro.
In July, a hack at DigiNotar resulted in a large number of fake SSL certificates being issued for popular domains, including Google, Facebook, Mozilla, the CIA, MI6 and the Mossad. The identity of these domains - as well as messages left by the alleged hackers - have led experts to believe that the Iranian government may have been behind the hack, with the intention of using the certificates to spy on dissidents. The fact that the certificates were not discovered until last week has caused many to worry that it has been successful in doing so.
When an Internet user connects to a website using HTTP over an SSL connection (HTTPS), the resulting traffic cannot be intercepted. However, HTTPS does not guarantee that the website at the other end is the one it claims to be. For instance, by hacking into DNS servers, traffic can be redirected to sites controlled by cybercriminals - or governments intent on spying on their citizens.
To prevent this from happening, the website presents the browser with an SSL certificate, which is signed using public-key cryptography by a CA. The public keys of a number of trusted certificates are stored in Internet browsers. Hence if an attacker gains access to a certificate for a popular domain signed by a trusted CA and is able to re-route traffic to that website, they can perform a man-in-the-middle attack that is unlikely to be noticed.
Data from Trend Micro suggests that this is indeed what has happened. The company noticed an unexpectedly large number of requests from Iran to validaion.diginotar.nl, the domain used to check the authenticity of DigiNotar's certificates. Because DigiNotar's customers are mainly in the Netherlands, the vast majority of requests for that domain usually tend to be from Dutch users. On 2 September, after the certificates had been revoked and all major browsers had removed DigiNotar from their lists of trusted CAs, requests from Iran had all but disappeared.
The Dutch government, which used DigiNotar as a CA for most of its websites, held an emergency meeting on Friday night, during which it decided to stop working with DigiNotar. During the weekend, this led to a small number of issues, with for instance local councillors being unable to log into their webmail. It currently seems unlikely that Dutch Internet users have been a target of this hack.
For some time, experts have expressed concern about the security of certificates and labelled them the 'weak link' in secure Internet browsing. In March a hack at Comodo, another CA, also led to rogue certificates for popular domains being signed. This hack was also linked to the Iranian government.
Although it is currently unknown whether the Comodo hack was related to the DigiNotar hack, the fact that the Iranian Ministry of ICT recently launched new DNS servers may make many an expert feel uncomfortable.
Unlikely related, but slightly worrying in this context, is the fact that yesterday the DNS servers used by a number of popular UK websites (including the Telegraph and The Register) were hacked.
More at Trend Micro here, while F-Secure has more on the DigiNotar hack here, with more on Sophos's Naked Security blog here.
Posted on 05 September 2011 by Virus Bulletin