Feeds

Inside 'Operation Black Tulip': DigiNotar hack analysed

CA systems falsely told Iranians they were secure

Protecting users from Firesheep and other Sidejacking attacks with SSL

The Google webmail of as many as 300,000 Iranians may have been intercepted using fraudulently issued security certificates made after a hack against Dutch certificate authority outfit DigiNotar, according to the preliminary findings of an official report into the megahack.

Fox-IT, the security consultancy hired to examine the breach against DigiNotar, reveals that DigiNotar was hacked on or around 6 June – a month before hackers begun publishing rogue certificates.

Between 10 July and 20 July hackers used compromised access to DigiNotar's systems to issue rogue 531 SSL certificate for Google and other domains, including Skype, Mozilla add-ons, Microsoft update and others. DigiNotar only began revoking rogue certificates on 19 July and waited more than a month after this to go public. The fake *.google.com certificate – which was valid for code-signing – wasn't revoked until 29 July.

The compromise was used, in part, to spy on Iranian internet users, using the forged Google SSL certificate to run man-in-the-middle attacks. Fox-IT found that the vast majority of queries against DigiNotar's OCSP servers (which browsers check to see if a certificate has been revoked) came from Iran during the attack period, unlike periods before and after the attack when the volume of such queries from Iran was negligible.

Many requests not originating from Iran appear to have originated via Tor exit nodes or other proxies used by Iranians in a bid to circumvent net censorship controls.

Shortcomings

The audit reveals a catalogue of security shortcomings at the small previously obscure Dutch certificate authority that allowed the hack to take place.

DigiNotar's servers ran out-of-date software. Its network was poorly segmented, so problems would not be contained if they arose. Passwords in play at the time of the hack might easily have been guessed via brute-force attack. In addition, there was no secure logging and server-side anti-virus protection was absent.

DigiNotar's shocking ineptness in securing its system, compounded with its failure to come clean on its problems in a timely fashion, have turned the firm into a security pariah.

Fox-IT said the hack used hacking tools such as Cain & Abel as well as a variety of custom scripts to pull off the attack. The security agency suggests links between the DigiNotar hack and an earlier attack on Comodo, another certificate authority, back in March.

"We found that the hackers were active for a longer period of time," the Fox-IT report concludes. "They used both known hacker tools as well as software and scripts developed specifically for this task. Some of the software gives an amateurish impression, while some scripts, on the other hand, are very advanced. In at least one script, fingerprints from the hacker are left on purpose, which were also found in the Comodo breach investigation of March 2011. Parts of the log files, which would reveal more about the creation of the signatures, have been deleted.

"The list of domains and the fact that 99 per cent of the users are in Iran suggest that the objective of the hackers is to intercept private communications in Iran," it adds.

DigiNotar's shocking ineptness has turned it into a security pariah

Fox-IT's investigation into the Operation Black Tulip attacks against DigiNotar continues. Trust in all certificates issued by DigiNotar has already been revoked by many browser and operating system developers (including Microsoft, Google and Mozilla but not Apple).

A DigiNotar-controlled intermediate, operationally separate from the SSL business directly hit by the breach, had been issuing certificates as part of the Dutch government’s public key infrastructure "PKIoverheid" scheme. DigiNotar was only one of the available CAs. The Dutch government initially said that the PKIoverheid certs issued by DigiNotar were OK but has since changed its stance over the weekend and ditched DigiNotar from the programme.

In a statement issued on Tuesday in the wake of the damning Fox-IT audit, Vasco (which acquired DigiNotar in January) said the problems with its CA subsidiary had no effect on its core Digipass authentication technology.

"The integration of DigiNotar technology into Vasco’s products was planned for 2012. This means that all Vasco products in the market today are 100 per cent DigiNotar-free. Your authentication project is safe with Vasco," the company asserted.

"Vasco does not expect that the DigiNotar security incident will have a significant impact on the company’s future revenue or business plans," it added. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.