Why are security vendors faking digital certificates?

Davey Winder shares his thoughts on the tricky subject of using digital certificates

digital padlocks

Kaspersky Lab got in touch at the end of last week to say the number of untrusted digital certificates used to sign off malicious software had doubled in the last year, with its anti-virus database highlighting more than 6,000 of the things, just to put this into context. 

A little context is never a bad thing, as there are plenty of sysadmins who routinely trust digital signatures without any further investigation and are happy to install signed files on this flawed trust assumption, which is worrying. Especially when stolen or faked signatures have been used for donkey's years to fool users into thinking malicious files are the exact opposite. Remember Stuxnet, anyone?

Advertisement - Article continues below

There's plenty of evidence to suggest cybercriminals actively trade in stolen digital certificates within the dark market that exists online, and some (such as the Darkhotel folk) even appear to have access to the keys needed to create fake certs.

Kaspersky Lab suggests, quite rightly, that digitally signed apps from unknown software vendors are prevented from launching, and permission should not be granted to launch them without checking serial numbers and hash sums first.

It also recommends that certificates from unknown certification centres are not installed in storage and users' systems are kept patched (the Microsoft MS13-098 update will eliminate the error that allows additional data in the signed file without violating the file signature, for example).

Advertisement - Article continues below

There is a certain degree of irony in receiving this piece of security information from a security vendor, when you think about how security software (although I don't know if Kaspersky uses this method, but some leading vendors certainly do) analyses content for malicious activity from within a browser with an SSL connection.

Advertisement - Article continues below

The SSL has to be decoded on-the-fly, as it were, then re-wrapped and all in such a seamless way within the network layer that nobody knows. This is done, and here comes the irony bit, by squirting a Certificate Authority into your trust store and generating a 'fake' certificate for every site being visited and analysed.

It's clever, and web-content filtering is a must have if you want to stay protected, but using these on-the-fly certs added into the Root Certificate store in Windows and major browsers seems like being warned to watch out for what the bad guys are doing.

But, isn't it some kind of man in the middle attack, albeit that the man is wearing a white hat? Trust is a two way street, and mine is starting to get rather too full of potholes to negotiate safely.

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now



University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular


How to find RAM speed, size and type

24 Jun 2020

The road to recovery

30 Jun 2020

The growing case for IT flexibility

30 Jun 2020