In-depth

Why are security vendors faking digital certificates?

Davey Winder shares his thoughts on the tricky subject of using digital certificates

digital padlocks

Kaspersky Lab got in touch at the end of last week to say the number of untrusted digital certificates used to sign off malicious software had doubled in the last year, with its anti-virus database highlighting more than 6,000 of the things, just to put this into context. 

A little context is never a bad thing, as there are plenty of sysadmins who routinely trust digital signatures without any further investigation and are happy to install signed files on this flawed trust assumption, which is worrying. Especially when stolen or faked signatures have been used for donkey's years to fool users into thinking malicious files are the exact opposite. Remember Stuxnet, anyone?

There's plenty of evidence to suggest cybercriminals actively trade in stolen digital certificates within the dark market that exists online, and some (such as the Darkhotel folk) even appear to have access to the keys needed to create fake certs.

Kaspersky Lab suggests, quite rightly, that digitally signed apps from unknown software vendors are prevented from launching, and permission should not be granted to launch them without checking serial numbers and hash sums first.

It also recommends that certificates from unknown certification centres are not installed in storage and users' systems are kept patched (the Microsoft MS13-098 update will eliminate the error that allows additional data in the signed file without violating the file signature, for example).

There is a certain degree of irony in receiving this piece of security information from a security vendor, when you think about how security software (although I don't know if Kaspersky uses this method, but some leading vendors certainly do) analyses content for malicious activity from within a browser with an SSL connection.

The SSL has to be decoded on-the-fly, as it were, then re-wrapped and all in such a seamless way within the network layer that nobody knows. This is done, and here comes the irony bit, by squirting a Certificate Authority into your trust store and generating a 'fake' certificate for every site being visited and analysed.

It's clever, and web-content filtering is a must have if you want to stay protected, but using these on-the-fly certs added into the Root Certificate store in Windows and major browsers seems like being warned to watch out for what the bad guys are doing.

But, isn't it some kind of man in the middle attack, albeit that the man is wearing a white hat? Trust is a two way street, and mine is starting to get rather too full of potholes to negotiate safely.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Leading the data race

The trends driving the future of data science

Download now

How to create 1:1 customer experiences at scale

Meet the technology capable of delivering the personalisation your customers crave

Download now

How to achieve daily SAP releases

Accelerate the pace of SAP change to support your digital strategy

Download now

Recommended

Third-party apps are tracking your WhatsApp activity
social media

Third-party apps are tracking your WhatsApp activity

21 Sep 2020
Ransomwiz lets you test your security with simulated ransomware
ransomware

Ransomwiz lets you test your security with simulated ransomware

21 Sep 2020
Best free malware removal tools 2020
Security

Best free malware removal tools 2020

21 Sep 2020
Windows Server flaw sparks emergency US gov warning
vulnerability

Windows Server flaw sparks emergency US gov warning

21 Sep 2020

Most Popular

Google Pixel 4a review: A picture-perfect package
Google Android

Google Pixel 4a review: A picture-perfect package

18 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020