Comodo Web Certificates Heist Linked To Iranian ISP

While it is worrying that attackers were able to obtain a trusted certificate for a domain not under their control, it was only a small step in a larger attack, Brian Trzupek, Trustwave’s vice president of managed identity and SSL, told eWEEK. Even with the certificates in hand, they would have still needed to tamper with the domain name server infrastructure to direct users to the malicious site holding the fraudulent certificate before they could have done any harm, according to Trzupek.

According to Comodo’s incident report, attackers requested nine certificates, but definitely received only one before the account was suspended. Comodo was not clear whether the attackers ever received the remaining certificates.

Rapid Action Prevented Larger Exploit

The March 15 breach was detected fairly quickly, so by the time the attackers got around to testing one of the certificates, it had already been revoked, according to Comodo.

The first step in this complicated attack required attackers to somehow compromise a Comodo trusted partner in Southern Europe, Comodo said. While Comodo did not specify the nature of the data breach, the partner had several login credentials to other online accounts stolen, as well, Comodo wrote in its blog post.

“It is likely that this cert type was combined with another attack vector to allow the attacker to gain access to the certificate,” Trzupek said.

The certificates themselves were not the ultimate goal. One of the domains the attacker targeted was the Mozilla Firefox add-on update server. Once users were redirected to the malicious site, the attackers could have injected arbitrary code into the Web browser or conned users looking for Firefox plug-ins that downloaded Trojans or key-loggers from the fraudulent site, Trzupek said. That would have been the final payoff for the attackers, whether it is gaining access to financial accounts, data theft or compromising the host machine, Trzupek said.

Comodo also noted that the targeted domains would have been of “greatest use” to a government attempting surveillance of Internet use by dissidents, especially considering the recent turmoil in North Africa and the Persian Gulf region.

The issued SSL certificate is generally a “domain validation only” certificate, Trzupek said. These types of certificates usually undergo automated validation where human review does not occur, he said.

While this attack affected only the Comodo certificate authority and not others, this could have had bigger implications as all Web browsers that trust Comodo as a root authority would have been affected, said Trzupek. For example, Comodo is included as a trusted root certification authority on all supported versions of Microsoft Windows.

Users should make sure to be on modern and fully updated browsers, as well as ensure they have not disabled CRL (Certificate Revocation List) or OCSP (Online Certificate Status Protocol) security checks in the browser.

Fahmida Y Rashid eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved.

View Comments

Recent Posts

OpenAI Secures $40 Billion Funding Deal With SoftBank, Others

SoftBank has agreed a funding deal that will see OpenAI being provided with up to…

4 hours ago

Tesla Sales Plummet Amid Elon Musk Backlash

Tesla sales have plummeted to lowest level in three years, as deliveries of new EVs…

5 hours ago

Amazon Launches Nova AI Agent To Perform Browser Actions

New addition. Next generation foundation model, as Amazon Nova model launches to perform actions within…

7 hours ago

Meta AI Head Announces Departure

Head of artificial intelligence research at Meta Platforms has announced she is leaving the social…

12 hours ago

CK Hutchison Says No Decision On Telco Spin-off, London Listing

No decision yet, after media reports CK Hutchison was to spin off its global telecom…

12 hours ago