There are always surprises in the field of cyber security. But this past week, something different seemed to happen that is really disconcerting. We saw four major news stories about how adversaries’ campaigns and methods hit the web with one common theme: The trust established by cryptographic keys and digital certificates is being misused everywhere.
What actually happened?
First, Kaspersky released a report on DarkHotel -- a very effective APT campaign enabled by dozens of misused digital certificates used to target traveling executives using hotel WiFi networks. These executives thought they were transmitting data privately, in an authenticated way, but the malware operators used compromised certificates to get in between unsuspecting executives and their businesses.
Then researchers at the University of Maryland issued interesting research on Heartbleed that verified what we at Venafi have been saying all along: You have to change all the keys and certificates. These UMD researchers found that within 3 weeks of the Heartbleed incident, at least 87% of certificates had not been fully remediated (private keys changed, certificates reissued, and bad ones revoked). It’s not an option to ignore Heartbleed any longer. The Community Health Systems breach subsequently demonstrated how exploiting Heartbleed-vulnerable certificates is not theoretical. Attackers will choose when and where to use their exploits. What are people waiting for?
Next came the news of WireLurker, a malware Trojan targeting iOS where the keys and certificates used to sign apps for an iOS enterprise app store were compromised. With this new threat, attackers can load software onto an Apple device that isn’t jailbroken. This is no surprise to anyone watching changes in the threatscape. Intel Security has been raising this issue since at least 2013: “The rapid escalation of malicious signed binaries quarter-over-quarter and year-over-year brings into question the viability of the Certificate Authority model.”
Finally, news broke earlier this month that, for a mere $0.65, researchers (and guaranteed bad guys) can perform collisions needed to compromise a digital certificate using an Amazon Web Services EC2. In this instance, the crypto-attack was against the widely used MD5 algorithm. And it only took 10 hours using a single instance. Remember Flame? The exploit of the Windows update service using a compromised certificate? Unfortunately, this is not just a problem for Microsoft. In every Global 2000 organization Venafi works with, we still find vulnerable MD5 certificates leaving the door open to very powerful spoofing and man-in-the-middle attacks.
This is important because ...
All of these news stories should be a serious wake-up call for the infosec industry. The threatscape has changed. Attackers need trusted status, and they know they can get it by misusing keys and certificates. What else does this mean? Unfortunately, it means almost every single security control that you’ve spent millions on to protect your network, apps, and data can be undermined and circumvented.
Why? Because hackers know they can get around your strong authentication with spoofing and man-in-the-middle attacks. They know you can’t decrypt all incoming SSL traffic and can’t see their new attack because your threat detection systems don’t have all of the keys to decrypt traffic. They know your privileged access management systems don’t know the difference between a good and rogue SSH keys. They know all of your data protection systems can be foiled with the compromise of just one SSL key and certificate that won’t be changed for years.
[Read about how to Stop Trusting Signed Malware in three steps.]
The foundation of trust of our digital systems -- from banking, to the cloud, to mobile apps, to your business -- is all based on keys and certificates, and it's under attack. It may appear that the world is coming to an end. Some have wondered, is the cryptoapolcalypse upon us? No, it’s not. But the threatscape has changed, and we all need to respond. Edward Snowden’s comment from earlier this year is just one example of how we’re waking up to this problem: To circumvent security like encryption, the best method is to “try to steal their keys and bypass the encryption. That happens today and that happens every day. That is the way around it.”
I know many CISOs, security architects, and security operations teams will continue to spend more money on strong authentication, DLP, threat detection, SSL traffic decryption, privileged access management, and more. However, if we continue to blindly trust keys and certificates -- if we don’t know how many we have, don’t know what they’re used for, can’t enforce policy, can’t detect anomalous certificates, can’t safely deliver them to threat detection systems to inspect traffic, and can’t replace one or many in seconds, not weeks (incident response teams: remember Heartbleed?), then we’ll continue to undermine and devalue all other critical security controls. It’s why the SANS20 Critical Security list has been updated to now include guidance on securing keys and certificates. It’s why the PCI Security Standards Council considered it a high priority in 2015 Special Interest Group selection to improve security for cardholder data.
Over the last month I’ve met with CISOs and their teams from Berlin to Sydney. The message is the same: The threatscape has changed and the risk posed by the misuse of keys and certificates is very high. CISOs, security architects, and security operations teams need to wake up and realize the root of the problem: You simply can no longer blindly trust certificates. Gartner’s Neil MacDonald simply described this as “living in a world without trust” where “certificates can no longer be blindly trusted” -- a reality that security professionals cannot tolerate if we expect to stay ahead of the bad guys and defend our businesses and customers.