Thursday, September 8, 2011

Shaw Capital Management Factoring: Fraudulent Google certificate points to Internet attack

http://shaw-capitalmanagementfactoring.com/2011/09/shaw-capital-management-factoring-fraudulent-google-certificate-points-to-internet-attack/


This screenshot shows the warning the user got when attempting to log into Gmail.
This screenshot shows the warning the user reportedly got when attempting to log in to Gmail.
A Dutch company appears to have issued a digital certificate for Google.com to someone other than Google, who may be using it to try to re-direct traffic of users based in Iran.
Yesterday, someone reported on a Google support site that when attempting to log in to Gmail the browser issued a warning for the digital certificate used as proof that the site is legitimate, according to this thread on a Google support forum site.
“Today, when I tried to login to my Gmail account I saw a certificate warning in Chrome,” someone using the screen name “alibo” wrote. “I think my ISP or my government did this attack (because I live in Iran and you may hear something about the story of Comodo hacker!)” Alibo then posted a screenshot and the text of the certificate. The screenshot page was not accessible.
In this case the browser of the person reporting the problem warned that there was a problem with the digital certificate. However, it’s unclear what triggered the warning and other browsers may not. In that event, a user could end up on a site that purports to be google.com but isn’t.
CNET verified that the digital certificate is fraudulent. This Pastebin post details how to verify that a certificate is real and notes that it was issued in July. More information on how to mitigate the risk from the DigiNotar certificate is provided on this Facebook page from Ryan Hurst, manager of advertising security engineering at Microsoft.
A Google spokesman provided CNET with this statement: “A Chrome security feature warned the user of the invalid certificate and blocked them from visiting the attacker’s site. We’re pleased that the security measures in Chrome protected the user and brought this attack to the public’s attention. While we investigate, we plan to block any sites whose certificates were signed by DigiNotar.”
Mozilla said in a blog post that it was “Because the extent of the mis-issuance is not clear, we are releasing new versions of Firefox… shortly that will revoke trust in the DigiNotar root and protect users from this attack. We encourage all users to keep their software up-to-date by regularly applying security updates. Users can also manually disable the DigiNotar root through the Firefox preferences.”
The certificate was issued by DigiNotar, based in the Netherlands. Representatives from the company did not immediately respond to an e-mail seeking comment today and an automated message said the offices were closed for the night and offered no voice-mail option. A phone call and e-mail to Vasco Data Security, parent company of DigiNotar, were not immediately returned.
The situation is similar to one that happened in March in which spoofed certificates were found involving Google, Yahoo, Microsoft, and other major sites and they used Internet Protocol addresses in Iran. In that case, the fraudulent digital certificates were acquired through reseller partners of certificate authority Comodo and a 21-year-old Iranian patriot took credit for the attack, saying he was protesting U.S. foreign policy.
Moxie Marlinspike, chief technology officer of mobile security firm Whisper Systems and an expert on Internet authentication infrastructure, warned against jumping to conclusions about who is behind the attack.
“Clearly something is amiss. There’s a rogue cert for all of Google services in the wild,” he told CNET. “Of course many people are quick to claim that the state of Iran is responsible for all this but I think it’s probably too soon to draw that conclusion. There doesn’t seem to be any specific evidence.”
These situations happen all the time, and rather than point fingers, the industry should fix the underlying problem, he said. In the meantime, individual Web surfers can protect themselves by using a Firefox plug-in Marlinspike developed called Convergence. “My hope is that this will be integrated into Web browsers themselves” in the future, he said.
These attacks illustrate a fundamental weakness with the current Web site authentication system in which third parties issue certificates that prove that a Web site is legitimate when making an “https://” connection. The list of certificate issuers has ballooned over the years to approximately 650 organizations, which may not always follow the strictest security procedures. And each one has a copy of the Web’s master keys. There is no automated process to revoke fraudulent certificates, nor is there a public list of certificates that companies like Comodo have issued, or even which of its resellers or partners have been given a duplicate set of the master keys. And there are no mechanisms to prevent fraudulent certificates for Yahoo Mail or Gmail from being issued by compromised companies, or repressive regimes bent on surveillance.
Today’s system gives browser makers tremendous responsibility. Any list of so-called certificate authorities they include will be trusted by billions of Web browsers around the world, unless users take the time to change the settings.
“I expect this type of attack to become somewhat commonplace in time,” said Roel Schouwenberg, senior researcher at Kaspersky Lab. “And in this case we may be looking at a double whammy – not only does SSL suffer yet another blow, we may also be looking at a serious compromise within Vasco. The latter could have a very significant impact.”

No comments:

Post a Comment