Endpoint // Authentication
7/9/2014
04:18 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Fake Google Digital Certificates Found & Confiscated

A certificate authority in India had issued rogue certificates for some Google domains, the search engine giant discovers.

Google yesterday said that rogue digital certificates for several Google domains had been issued by an intermediate certificate authority in India connected to the Indian government's CA. The search engine giant on July 2 learned of the "unauthorized" digital certificates, Adam Langley, security engineer with Google, said in a blog post yesterday. The certificates had been issued by the National Informatics Centre of India, which has multiple CAs authorized by India's Controller of Certifying Authorities (CCA). India CCA certificates are in the Microsoft Root Store, so Windows applications such as Internet Explorer and Chrome use them, he said.

Microsoft, meanwhile, said it's unaware of any abuse of its domains via the rogue certificates. "We are aware of the mis-issued third-party certificates and we have not detected any of the certificates being issued against Microsoft domains. We are taking the necessary precautions to help ensure that our customers remain protected," a Microsoft spokesperson said in a statement provided to Dark Reading.

Chrome browsers running on non-Windows operating systems such as Chrome OS, Android, iOS, and OS X were not affected, according to Langley, who also pointed out that Chrome on Windows would not have recognized the phony Google certificates, thanks to Google's public-key pinning feature. Public-key pinning basically white-lists in the browser a CA's public key for specific domains. But "mis-issued certificates for other sites may exist," he said.

Google has blocked the phony certificates in Chrome, and India CCA has revoked three certificates issued to NICCA. Chrome users are protected by the new certificate revocation list updates, he said. The company has not seen "widespread abuse" and is not recommending password changes.

Bruce Morton, director of certificate technology and standards at Entrust, a member of the Certificate Authority Security Council, says it's unclear what the rogue domains were intended for, but the obvious options would be surveillance, nation-state spying, and phishing for financial gain.

"The big concern for Google and others is about when [a phony] certificate is used for communications" and at risk of being intercepted, he says. "The day the upper-level CA [in India] revoked those certificates, that took the [intermediate] CA out of business," Morton says. "They might have found more issues than they found with the Google" fake certs, he says.

At the heart of the problem is the blind trust in digital certificates, says Kevin Bocek, vice president of security strategy and threat intelligence at Venafi. "The use of malicious certificates in India to impersonate Google is a serious and alarming threat for everyone," Bocek says. "And even more alarming is what if attackers were compromising certificates used for payment systems, banks, or even e-enabled aircraft from Boeing to Airbus? … This is no longer a hypothetical threat -- the use of malicious certificates in India against Google and its customers is just one more example of how serious this problem is."

Entrust's Morton says there was a certificate validation problem with India's CA. "You always assume the public CAs are guaranteeing the validity of a certificate. If they're not following verification procedures, are they following quality [procedures]?" he asks. "That's a question in my mind," he says.

 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/10/2014 | 3:55:41 PM
Re: cyber espionage
UPDATE: Microsoft has just issued a security advisory on this threat, and issued this statement from a spokesperson:

"We have been working diligently on the mis-issued third-party certificates and have untrusted the related Subordinate Certification Authority certificates to ensure that our customers remain protected. Customers with automatic updates enabled do not need to take any action to remain protected. For more details refer to Security Advisory 2982792."

 

Here's the advisory:

http://blogs.technet.com/b/msrc/archive/2014/07/10/security-advisory-2982792-released-certificate-trust-list-updated.aspx
s3curity
50%
50%
s3curity,
User Rank: Apprentice
7/10/2014 | 10:35:31 AM
Re: cyber espionage
Call me a conspiracy nut!

Given all the spying we are learning about by the the NSA, via Snowden, how likely is it the NSA is already doing this.  Remember not to long ago, the NSA shut down encrypted mail providers.  If the NSA has intermidiary certs, they can generate certs and intercept public web mail.

 

Big Brother is watching!
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
7/9/2014 | 6:16:08 PM
Re: cyber espionage
Likely. I also wonder what the "other" possible issues were that Google referenced.
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
7/9/2014 | 6:10:51 PM
cyber espionage
I agree with Kevin Bocek when he says that the principal problem is the blind trust in digital certificates.

The use of unauthorized certificates to impersonate Google is a serious problem, I believe that this is a significant case of cyber espionage.
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7298
Published: 2014-10-24
adsetgroups in Centrify Server Suite 2008 through 2014.1 and Centrify DirectControl 3.x through 4.2.0 on Linux and UNIX allows local users to read arbitrary files with root privileges by leveraging improperly protected setuid functionality.

CVE-2014-8346
Published: 2014-10-24
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.

CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.