Iran may have been involved in an attack that resulted in hackersโ acquiring bogus digital certificates for some of the Webโs biggest sites, including Google and Gmail, Microsoft, Skype and Yahoo, a certificate issuing firm said today.
The bogus certificates โ which are used to prove that a site is legitimate โ were acquired by attackers last week when they used a valid username and password to access an affiliate of Comodo, which issues SSL certificates through its UserTrust arm.
Today, Comodoโs CEO said his company believes the attack was state-sponsored and pointed a finger at Iran.
โWe believe these are politically motivated, state-driven/funded attacks,โ said Melih Abdulhayoglu, the CEO and founder of Comodo, a Jersey City, N.J.-based security company that is also allowed to issue site certificates.
โOne of the origins of the attack that we experienced is from Iran,โ Abdulhayoglu said in anonline statementย . โWhat is being obtained would enable the perpetrator to intercept Web-based email/communication and the only way this could be done is if the perpetrator had access to the countryโs DNS infrastructure, and we believe it might be the case here.โ
Comodoโs security blogย offered more details of the Iranian connection and claimed that at least two Iranian IP addresses and one ISP were involved.
โThe IP address of the initial attack โฆ has been determined to be assigned to an ISP in Iran,โ said Comodo. โA Web survey revealed one of the certificates [was] deployed on another IP address assigned to an Iranian ISP.โ
That server went offline shortly after Comodo revoked the certificates.
Fake certificates can be used by attackers to fool users into thinking that theyโre at a legitimate site when in reality theyโre not, said Andrew Storms, director of security operations at nCircle Security.
โThey would be used in a โman-in-the-middleโ kind of attack,โ said Storms. โThey could use [the bogus certificates] to host a site that looks like one of these real sites, then capture peopleโs log-ins.โ
Comodo echoed Stormsโ take on the attackโs implication, but speculated that it was a government-backed effort.
โIt does not escape [our] notice that the domains targeted would be of greatest use to a government attempting surveillance of Internet use by dissident groups,โ Comodo said. โThe attack comes at a time when many countries in North Africa and the [Persian] Gulf region arefacing popular protestsย .โ
According to aย Microsoft security advisoryย published earlier today, the nine fake certificates were issued for login.live.com, mail.google.com, google.com, login.yahoo.com, login.skype.com, addons.mozilla.org and Global Trustee.
Three certificates were acquired forย Yahooย , saidย Microsoftย , and one each for the others.
The attack and acquisition of the certificates has promptedย Googleย , Microsoft and Mozilla to issue updates so users of theirย browsersย will be warned if they try to reach a site thatโs serving up one of the phony certificates.
Google was the first to react: Itย updated Chromeย last week.
On Tuesday,ย Mozilla shipped updatesย for its Firefox 3.5 and Firefox 3.6 browsers to do the same; it had already revamped Firefox 4 before the new browserโs Tuesdayโs launch.
Microsoft followed today with an update to all Windows users that adds the nine certificates to the operating systemโs blacklist, which Internet Explorer (IE) accesses. The update has been pushed to Microsoftโs Windows Update service for users running Windows XP, Server 2003, Vista, Server 2008,ย Windows 7ย and Server 2008 R2.
Comodo said the attackers obtained the certificates on March 15 using a username and password assigned to a company partner in southern Europe. It has not identified the partner, but admitted it didnโt know all the details.
โWe are not yet clear about the nature or the details of the breach suffered by that partner other than knowing that other online accounts โ [although] not with Comodo โ held by that partner were also compromised at about the same time,โ Comodo said.
Storms called Comodoโs failure a major security event. โItโs a big deal when a trusted authority issues something it clearly shouldnโt have,โ Storms said. โPeople start second-guessing whether a site is really what it says it is.โ
It could also be a financial hit to Comodo, Storms added, pointing out that certificate-issuing authorities regularly post bonds to account for liability reasons or to account for potential lawsuits when problems crop up.
โComodo has put money on the validity of their certificates,โ Storms said.
Nor is it surprising that attackers would be very interested in acquiring certificates to such major Web players as Google, Microsoft and Yahoo.
โTheyโre getting a lot for their buck,โ said Storms, talking about the hackersโ efforts.
Comodo said it reacted to last weekโs attack โwithin hoursโ and revoked the certificates. โAt no time were any Comodo root keys, intermediate CAs [certificate authorities] or secure hardware compromised,โ the company asserted.
Even though the certificates have been revoked, Chrome and Firefox users should make sure to update their browsers, said Storms, and IE users should deploy todayโs Windows update from Microsoft.