Adobe scrambles to revoke stolen cert
Malware signed as Adobe software
Adobe has revealed an attack that compromised some of its software development servers, resulting in its code signing certificate being used to disguise malware as Adobe software.
The attackers compromised a build server, Adobe says in this statement, which had “access to the Adobe code signing infrastructure”. The build server had been put into service even though “the details of the machine’s configuration were not to Adobe corporate standards”.
The company is now revoking the certificates, which had been used to sign at least pwdump7 v7.1, which extracts password hashes from Windows; libeay32.dll, which works in conjunction with pwdump; and myGeeksmail.dll, which it describes as a malicious ISAPI filter.
Adobe says it has set up an interim signing service for all components signed with the impacted key since July 10, 2012. New certificates will be issued on October 4, the company says.
On this page, Adobe provides information for users of its software to determine whether they need to take any action.
The breach “only affects the Adobe software signed with the impacted certificate that runs on the Windows platform and three Adobe AIR applications that run on both Windows and Macintosh”, the statement says. ®
Re: Is this new?
... causes system crashes, slows things down, and opens back doors. All of it was signed with Adobe certificate.
It didn't also display a splash screen saying "Adobe Air" by any chance?
Is this new?
I've seen quite a bit of malware that causes system crashes, slows things down, and opens back doors. All of it was signed with Adobe certificate. Some of it is was even integrated into the browser and would prompt to install or update itself when visiting certain sites. Another vector was files with .pdf extension. Upon trying to open one, you would be prompted with a request to download the malware. I'm not sure in what way this is news.
It's a dead cert.