Site icon

Comodo CEO accuses nation state of sponsoring SSL certificate attacks

An attack on a Dutch company that issues certificates used to authenticate websites was state-sponsored, according to the chief executive of Comodo, a company that also issues digital certificates and suffered a similar setback in March.

Asked to characterise the DigiNotar attack, president and chief executive of Comodo Melih Abdulhayoglu said, “We believe this is state-sponsored. It seems that they need these certificates, as we stated in March, they will not stop attacking.”

Evidence suggests Iran is the state behind the attacks. An analysis by Trend Micro of the rogue SSL certificates issued by the DigiNotar hackers led that security firm to conclude that the attack was “used to spy on Iranian Internet users on a large scale.”

“We found that Internet users in more than 40 different networks of ISPs and universities in Iran were met with rogue SSL certificates issued by DigiNotar,” it said. “Even worse, we found evidence that some Iranians who used software designed to circumvent traffic censorship and snooping were not protected against the massive man-in-the-middle attack.”

A man-in-the-middle attack is one where an attacker intercepts communication between two systems, such as between a PC and user accessing their Gmail account.

If Iran is behind the DigiNotar and Comodo attacks though, it seems intent on hiding the fact behind a single hacker with the handle Comodohacker. In a posting on Pastebin yesterday, Comodohacker bragged about stealing certificates from both Comodo and DigiNotar.

What’s more, the hacker said he has access to four more high profile certificate issuing authorities that he’ll use in future attacks.

Although keeping the names of the four high-profile certificate issuing authorities close to the vest, Comodohacker did mention two others, GlobalSign and StartCom CA, he claimed to have breached. When asked about those claims, GlobalSign said it was investigating the matter and StartCom said it detected the attack and foiled it before any fraudulent certificates could be issued.

As evidence that he was behind the DigiNotar attack, Comodohacker, who was silent for months before yesterday’s Pastebin posting, published the password he used to gain access to DigiNotar’s administrative functions.

A preliminary report released yesterday by Fox-It, the security firm hired by DigiNotar to investigate the break-in, noted that in a script used in the attack “fingerprints from the hacker are left on purpose, which were also found in the Comodo breach investigation of March 2011.”

In his posting, the hacker said his attack on DigiNotar was in retaliation for Dutch and Serbian actions against Muslims 16 years ago. He also said he intended to hurt the finances of DigiNotar, which is owned by an American company, Vasco.

Vasco stock was selling at $13.44 share on July 19 when DigiNotar discovered the breach. Today, it’s selling at $6.62 a share. However, over that period the stock market has been in a general decline, so the plummet of Vasco’s stock may have less to do with the DigiNotar attack than with universal market trends.

Comodo’s chief executive warned his competitors that they should protect their infrastructure.

“The days of wiretapping phone lines are gone, the days of reading emails or Facebook or intercepting Skype communication is here,” Abdulhayoglu declared. “The key to reading these communications are held by certification authorities. So that is why they have become the new target for states that have a need for intercepting communication.”

Article source: http://rss.feedsportal.com/c/270/f/3551/s/180ec94a/l/0Lnews0Btechworld0N0Csecurity0C330A18360Ccomodo0Eceo0Eaccuses0Enation0Estate0Eof0Esponsoring0Essl0Ecertificate0Eattacks0C0Dolo0Frss/story01.htm

View full post on National Cyber Security » Computer Hacking

Gergory Evans

Gregory Evans | LinkedIn

Interview With Gregory Evans

Gregory Evans Security Expert

Gregory Evans on Cyber Crime

Exit mobile version