Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //

Authentication

7/9/2014
04:18 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Fake Google Digital Certificates Found & Confiscated

A certificate authority in India had issued rogue certificates for some Google domains, the search engine giant discovers.

Google yesterday said that rogue digital certificates for several Google domains had been issued by an intermediate certificate authority in India connected to the Indian government's CA. The search engine giant on July 2 learned of the "unauthorized" digital certificates, Adam Langley, security engineer with Google, said in a blog post yesterday. The certificates had been issued by the National Informatics Centre of India, which has multiple CAs authorized by India's Controller of Certifying Authorities (CCA). India CCA certificates are in the Microsoft Root Store, so Windows applications such as Internet Explorer and Chrome use them, he said.

Microsoft, meanwhile, said it's unaware of any abuse of its domains via the rogue certificates. "We are aware of the mis-issued third-party certificates and we have not detected any of the certificates being issued against Microsoft domains. We are taking the necessary precautions to help ensure that our customers remain protected," a Microsoft spokesperson said in a statement provided to Dark Reading.

Chrome browsers running on non-Windows operating systems such as Chrome OS, Android, iOS, and OS X were not affected, according to Langley, who also pointed out that Chrome on Windows would not have recognized the phony Google certificates, thanks to Google's public-key pinning feature. Public-key pinning basically white-lists in the browser a CA's public key for specific domains. But "mis-issued certificates for other sites may exist," he said.

Google has blocked the phony certificates in Chrome, and India CCA has revoked three certificates issued to NICCA. Chrome users are protected by the new certificate revocation list updates, he said. The company has not seen "widespread abuse" and is not recommending password changes.

Bruce Morton, director of certificate technology and standards at Entrust, a member of the Certificate Authority Security Council, says it's unclear what the rogue domains were intended for, but the obvious options would be surveillance, nation-state spying, and phishing for financial gain.

"The big concern for Google and others is about when [a phony] certificate is used for communications" and at risk of being intercepted, he says. "The day the upper-level CA [in India] revoked those certificates, that took the [intermediate] CA out of business," Morton says. "They might have found more issues than they found with the Google" fake certs, he says.

At the heart of the problem is the blind trust in digital certificates, says Kevin Bocek, vice president of security strategy and threat intelligence at Venafi. "The use of malicious certificates in India to impersonate Google is a serious and alarming threat for everyone," Bocek says. "And even more alarming is what if attackers were compromising certificates used for payment systems, banks, or even e-enabled aircraft from Boeing to Airbus? … This is no longer a hypothetical threat -- the use of malicious certificates in India against Google and its customers is just one more example of how serious this problem is."

Entrust's Morton says there was a certificate validation problem with India's CA. "You always assume the public CAs are guaranteeing the validity of a certificate. If they're not following verification procedures, are they following quality [procedures]?" he asks. "That's a question in my mind," he says.

 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/10/2014 | 3:55:41 PM
Re: cyber espionage
UPDATE: Microsoft has just issued a security advisory on this threat, and issued this statement from a spokesperson:

"We have been working diligently on the mis-issued third-party certificates and have untrusted the related Subordinate Certification Authority certificates to ensure that our customers remain protected. Customers with automatic updates enabled do not need to take any action to remain protected. For more details refer to Security Advisory 2982792."

 

Here's the advisory:

http://blogs.technet.com/b/msrc/archive/2014/07/10/security-advisory-2982792-released-certificate-trust-list-updated.aspx
s3curity
50%
50%
s3curity,
User Rank: Apprentice
7/10/2014 | 10:35:31 AM
Re: cyber espionage
Call me a conspiracy nut!

Given all the spying we are learning about by the the NSA, via Snowden, how likely is it the NSA is already doing this.  Remember not to long ago, the NSA shut down encrypted mail providers.  If the NSA has intermidiary certs, they can generate certs and intercept public web mail.

 

Big Brother is watching!
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
7/9/2014 | 6:16:08 PM
Re: cyber espionage
Likely. I also wonder what the "other" possible issues were that Google referenced.
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
7/9/2014 | 6:10:51 PM
cyber espionage
I agree with Kevin Bocek when he says that the principal problem is the blind trust in digital certificates.

The use of unauthorized certificates to impersonate Google is a serious problem, I believe that this is a significant case of cyber espionage.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Exactly
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25514
PUBLISHED: 2020-09-22
Sourcecodester Simple Library Management System 1.0 is affected by Incorrect Access Control via the Login Panel, http://<site>/lms/admin.php.
CVE-2020-25515
PUBLISHED: 2020-09-22
Sourcecodester Simple Library Management System 1.0 is affected by Insecure Permissions via Books > New Book , http://<site>/lms/index.php?page=books.
CVE-2020-14022
PUBLISHED: 2020-09-22
Ozeki NG SMS Gateway 4.17.1 through 4.17.6 does not check the file type when bulk importing new contacts ("Import Contacts" functionality) from a file. It is possible to upload an executable or .bat file that can be executed with the help of a functionality (E.g. the "Application Star...
CVE-2020-14023
PUBLISHED: 2020-09-22
Ozeki NG SMS Gateway through 4.17.6 allows SSRF via SMS WCF or RSS To SMS.
CVE-2020-14024
PUBLISHED: 2020-09-22
Ozeki NG SMS Gateway through 4.17.6 has multiple authenticated stored and/or reflected XSS vulnerabilities via the (1) Receiver or Recipient field in the Mailbox feature, (2) OZFORM_GROUPNAME field in the Group configuration of addresses, (3) listname field in the Defining address lists configuratio...