Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //

Authentication

7/9/2014
04:18 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Fake Google Digital Certificates Found & Confiscated

A certificate authority in India had issued rogue certificates for some Google domains, the search engine giant discovers.

Google yesterday said that rogue digital certificates for several Google domains had been issued by an intermediate certificate authority in India connected to the Indian government's CA. The search engine giant on July 2 learned of the "unauthorized" digital certificates, Adam Langley, security engineer with Google, said in a blog post yesterday. The certificates had been issued by the National Informatics Centre of India, which has multiple CAs authorized by India's Controller of Certifying Authorities (CCA). India CCA certificates are in the Microsoft Root Store, so Windows applications such as Internet Explorer and Chrome use them, he said.

Microsoft, meanwhile, said it's unaware of any abuse of its domains via the rogue certificates. "We are aware of the mis-issued third-party certificates and we have not detected any of the certificates being issued against Microsoft domains. We are taking the necessary precautions to help ensure that our customers remain protected," a Microsoft spokesperson said in a statement provided to Dark Reading.

Chrome browsers running on non-Windows operating systems such as Chrome OS, Android, iOS, and OS X were not affected, according to Langley, who also pointed out that Chrome on Windows would not have recognized the phony Google certificates, thanks to Google's public-key pinning feature. Public-key pinning basically white-lists in the browser a CA's public key for specific domains. But "mis-issued certificates for other sites may exist," he said.

Google has blocked the phony certificates in Chrome, and India CCA has revoked three certificates issued to NICCA. Chrome users are protected by the new certificate revocation list updates, he said. The company has not seen "widespread abuse" and is not recommending password changes.

Bruce Morton, director of certificate technology and standards at Entrust, a member of the Certificate Authority Security Council, says it's unclear what the rogue domains were intended for, but the obvious options would be surveillance, nation-state spying, and phishing for financial gain.

"The big concern for Google and others is about when [a phony] certificate is used for communications" and at risk of being intercepted, he says. "The day the upper-level CA [in India] revoked those certificates, that took the [intermediate] CA out of business," Morton says. "They might have found more issues than they found with the Google" fake certs, he says.

At the heart of the problem is the blind trust in digital certificates, says Kevin Bocek, vice president of security strategy and threat intelligence at Venafi. "The use of malicious certificates in India to impersonate Google is a serious and alarming threat for everyone," Bocek says. "And even more alarming is what if attackers were compromising certificates used for payment systems, banks, or even e-enabled aircraft from Boeing to Airbus? … This is no longer a hypothetical threat -- the use of malicious certificates in India against Google and its customers is just one more example of how serious this problem is."

Entrust's Morton says there was a certificate validation problem with India's CA. "You always assume the public CAs are guaranteeing the validity of a certificate. If they're not following verification procedures, are they following quality [procedures]?" he asks. "That's a question in my mind," he says.

 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/10/2014 | 3:55:41 PM
Re: cyber espionage
UPDATE: Microsoft has just issued a security advisory on this threat, and issued this statement from a spokesperson:

"We have been working diligently on the mis-issued third-party certificates and have untrusted the related Subordinate Certification Authority certificates to ensure that our customers remain protected. Customers with automatic updates enabled do not need to take any action to remain protected. For more details refer to Security Advisory 2982792."

 

Here's the advisory:

http://blogs.technet.com/b/msrc/archive/2014/07/10/security-advisory-2982792-released-certificate-trust-list-updated.aspx
s3curity
50%
50%
s3curity,
User Rank: Apprentice
7/10/2014 | 10:35:31 AM
Re: cyber espionage
Call me a conspiracy nut!

Given all the spying we are learning about by the the NSA, via Snowden, how likely is it the NSA is already doing this.  Remember not to long ago, the NSA shut down encrypted mail providers.  If the NSA has intermidiary certs, they can generate certs and intercept public web mail.

 

Big Brother is watching!
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
7/9/2014 | 6:16:08 PM
Re: cyber espionage
Likely. I also wonder what the "other" possible issues were that Google referenced.
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
7/9/2014 | 6:10:51 PM
cyber espionage
I agree with Kevin Bocek when he says that the principal problem is the blind trust in digital certificates.

The use of unauthorized certificates to impersonate Google is a serious problem, I believe that this is a significant case of cyber espionage.
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27569
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27570
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 3.015. Attackers can close any running process by sending the process name in a specially crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27571
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can retrieve recently used and running applications, their icons, and their file paths. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27572
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Authentication Bypass can occur via Packet Replay. Remote unauthenticated users can execute arbitrary code via crafted UDP packets even when passwords are set.
CVE-2021-27573
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Remote unauthenticated users can execute arbitrary code via crafted UDP packets with no prior authorization or authentication.