Verifone selects Thales to protect card holder dat... » San Francisco, CA and Plantation: Thales has announce that Verifone now uses Thales nShield hardware... Lancope launches ProxyWatch Solution » LONDON: Lancope, Inc. has unveiled its new ProxyWatch™ solution for enhanced security context at RSA... How ancient footprints can help us understand mode... » Bournemouth University’s newest research Institute – the Institute for Studies in Landscape and Huma... Women’s empowerment key to end sexual violence in ... »     UN Photo/Christopher Herwig As the great moral issue of our time, sexual violence in conflict... Nigeriaghanistan: A nation's backward march to neo... » ....The Mai Kunu-Ngbati Alliance From 1817 Till The Present And The Scramble for Nigeria Under Ba... Director pleads guilty for using fake security gua... » Johnny Okeoma, a Director of Tripleway Ltd, pleaded guilty at Barkingside Magistrates Court on 19 Ma... UN envoy blasts terrorist attack on Ministry in So... » A street scene in Mogadishu, the Somali capital. Photo: AU-UN IST/Stuart Price Vigilance can report... Demand for Vegan Trademark at unprecedented high » The Vegan Society proudly showcases its biggest ever presence at the Natural & Organic Products ... Becrypt signs new SME partnership with Atos UK » London, UK:  Becrypt has entered into a partnership with Atos UK as part of the Atos SME Harbour pro... itSoft extends its security-as-a-service offerin... » Clavister has announced that itSoft, a leading ISP and cloud managed services provider in Croatia, h...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

London: Venafi, the Enterprise Key and Certificate Management (EKCM) solutions specialist, says that a digital certificate-spoofing trojan – spotted by fellow security vendor Malwarebytes and capable of spoofing legitimate digital certificates – is a worrying development.

The problem, says Calum MacLeod, Venafi EMEA Director, is that the cybercriminals behind this malware appear to have set up a bogus company to obtain legitimate digital trust certificates from Digicert, the privately held US certificate authority (CA).

“This allows the cybercriminals to slide an infected PDF file into a large number of organisations, since the certificate is the equivalent of the `baggage checked’ tag on luggage as it is carried by an airline to its destination. In this case, everyone in the electronic chain takes the certificate - as they should – at its face value and the legitimate certificate authenticates the trojan” he said.

“The fact that the certificate is accepted at face value - while correct in the CA schema – indicates not that the schema itself is structurally flawed, but rather that the management of that trust instrument is flawed.

“It is management and control flaws like this that undermine confidence in the structural status quo of Internet security – and this is not good for anyone, or any user, of the World Wide Web, email and other forms of IP communications.”

These attacks expose that third-party trust providers are high-value targets for cybercriminals. Organisations know that Certificate Authorities (CAs) can be compromised or spoofed, and that these compromises can lead to devastating cyber attacks.

The risk of certificate and CA compromise is no longer hypothetical, and these events highlight the inability of businesses and governments to control trust. Increased dependence on encryption and digital certificates—critical trust instruments—requires effective controls. Yet most organisations have little idea how many keys and certificates exist within their networks, on mobile devices and in the cloud, where they are deployed, who has access to them or how they are managed.

Organisations that fail to deploy and manage these trust instruments subject themselves to data breaches, audit failures and unplanned outages, with increasing frequency and cost.