SUBSCRIBE

Firm points finger at Iran for SSL certificate theft

Iran may have been involved in an attack that resulted in hackersโ€™ acquiring bogus digital certificates for some of the Webโ€™s biggest sites, including Google and Gmail, Microsoft, Skype and Yahoo, a certificate issuing firm said today.

The bogus certificates โ€” which are used to prove that a site is legitimate โ€” were acquired by attackers last week when they used a valid username and password to access an affiliate of Comodo, which issues SSL certificates through its UserTrust arm.

Today, Comodoโ€™s CEO said his company believes the attack was state-sponsored and pointed a finger at Iran.

โ€œWe believe these are politically motivated, state-driven/funded attacks,โ€ said Melih Abdulhayoglu, the CEO and founder of Comodo, a Jersey City, N.J.-based security company that is also allowed to issue site certificates.

โ€œOne of the origins of the attack that we experienced is from Iran,โ€ Abdulhayoglu said in anonline statementย . โ€œWhat is being obtained would enable the perpetrator to intercept Web-based email/communication and the only way this could be done is if the perpetrator had access to the countryโ€™s DNS infrastructure, and we believe it might be the case here.โ€

Comodoโ€™s security blogย offered more details of the Iranian connection and claimed that at least two Iranian IP addresses and one ISP were involved.

โ€œThe IP address of the initial attack โ€ฆ has been determined to be assigned to an ISP in Iran,โ€ said Comodo. โ€œA Web survey revealed one of the certificates [was] deployed on another IP address assigned to an Iranian ISP.โ€

That server went offline shortly after Comodo revoked the certificates.

Fake certificates can be used by attackers to fool users into thinking that theyโ€™re at a legitimate site when in reality theyโ€™re not, said Andrew Storms, director of security operations at nCircle Security.

โ€œThey would be used in a โ€˜man-in-the-middleโ€™ kind of attack,โ€ said Storms. โ€œThey could use [the bogus certificates] to host a site that looks like one of these real sites, then capture peopleโ€™s log-ins.โ€

Comodo echoed Stormsโ€™ take on the attackโ€™s implication, but speculated that it was a government-backed effort.

โ€œIt does not escape [our] notice that the domains targeted would be of greatest use to a government attempting surveillance of Internet use by dissident groups,โ€ Comodo said. โ€œThe attack comes at a time when many countries in North Africa and the [Persian] Gulf region arefacing popular protestsย .โ€

According to aย Microsoft security advisoryย published earlier today, the nine fake certificates were issued for login.live.com, mail.google.com, google.com, login.yahoo.com, login.skype.com, addons.mozilla.org and Global Trustee.

Three certificates were acquired forย Yahooย , saidย Microsoftย , and one each for the others.

The attack and acquisition of the certificates has promptedย Googleย , Microsoft and Mozilla to issue updates so users of theirย browsersย will be warned if they try to reach a site thatโ€™s serving up one of the phony certificates.

Google was the first to react: Itย updated Chromeย last week.

On Tuesday,ย Mozilla shipped updatesย for its Firefox 3.5 and Firefox 3.6 browsers to do the same; it had already revamped Firefox 4 before the new browserโ€™s Tuesdayโ€™s launch.

Microsoft followed today with an update to all Windows users that adds the nine certificates to the operating systemโ€™s blacklist, which Internet Explorer (IE) accesses. The update has been pushed to Microsoftโ€™s Windows Update service for users running Windows XP, Server 2003, Vista, Server 2008,ย Windows 7ย and Server 2008 R2.

Comodo said the attackers obtained the certificates on March 15 using a username and password assigned to a company partner in southern Europe. It has not identified the partner, but admitted it didnโ€™t know all the details.

โ€œWe are not yet clear about the nature or the details of the breach suffered by that partner other than knowing that other online accounts โ€” [although] not with Comodo โ€” held by that partner were also compromised at about the same time,โ€ Comodo said.

Storms called Comodoโ€™s failure a major security event. โ€œItโ€™s a big deal when a trusted authority issues something it clearly shouldnโ€™t have,โ€ Storms said. โ€œPeople start second-guessing whether a site is really what it says it is.โ€

It could also be a financial hit to Comodo, Storms added, pointing out that certificate-issuing authorities regularly post bonds to account for liability reasons or to account for potential lawsuits when problems crop up.

โ€œComodo has put money on the validity of their certificates,โ€ Storms said.

Nor is it surprising that attackers would be very interested in acquiring certificates to such major Web players as Google, Microsoft and Yahoo.

โ€œTheyโ€™re getting a lot for their buck,โ€ said Storms, talking about the hackersโ€™ efforts.

Comodo said it reacted to last weekโ€™s attack โ€œwithin hoursโ€ and revoked the certificates. โ€œAt no time were any Comodo root keys, intermediate CAs [certificate authorities] or secure hardware compromised,โ€ the company asserted.

Even though the certificates have been revoked, Chrome and Firefox users should make sure to update their browsers, said Storms, and IE users should deploy todayโ€™s Windows update from Microsoft.

Tech Jobs

Categories