Microsoft Issues ‘Flame’ Patch

Microsoft has issued a fix for a security certificate flaw exploited by the Flame malware to make the code appear to have been legitimately signed

Microsoft issued an update on 3 June to address a certificate issue exploited in the Flame malware attacks.

Flame, which was publicised by security researchers last week, is a cyber-espionage toolkit that incorporates a wide range of functionality, including intercepting web traffic, recording audio and taking screenshots.

Fake certificate

According to Microsoft, components of Flame use were signed with an unauthorised digital certificate that chained up to a Microsoft sub-certification authority issued under the Microsoft Root Authority. This happened via the Terminal Server Licensing Service, which Microsoft operates to issue certificates to customers for “ancillary PKI- [public-key infrastructure-] based functions” in their enterprise.

By signing malware with fake certificates, attackers can trick browsers and applications into trusting malicious content, enabling activities such as phishing and man-in-the-middle attacks.

“When we initially identified that an older cryptography algorithm could be exploited and then be used to sign code as if it originated from Microsoft, we immediately began investigating Microsoft’s signing infrastructure to understand how this might be possible,” explained Jonathan Ness, of Microsoft Security Response Centre engineering team.

“What we found is that certificates issued by our Terminal Services licensing certification authority, which are intended to only be used for licence server verification, could also be used to sign code as Microsoft. Specifically, when an enterprise customer requests a Terminal Services activation licence, the certificate issued by Microsoft in response to the request allows code signing without accessing Microsoft’s internal PKI infrastructure.”

Trust revoked

“As soon as we discovered the root cause of this issue, we immediately began building an update to revoke the trust placed in the ‘Microsoft Enforced Licensing Intermediate PCA’ and ‘Microsoft Enforced Licensing Registration Authority CA’ signing certificates,” Ness wrote.

“That update is available today through Windows Update and Automatic Updates. This update places three certificates into the Windows Untrusted Certificate Store. We have also discontinued issuing certificates usable for code signing via the Terminal Services activation and licensing process.”

The use of unauthorised certificates is another link between Flame malware and Stuxnet and Duqu, which both used fraudulent or stolen certificates. Just recently, researchers Moxie Marlinspike and Trevor Perrin outlined a proposal they called TACK, or Trust Assertions for Certificate Keys, which they contend can help address the problem of spoofed Secure Sockets Layer (SSL) certificates by enabling a site to sign its TLS server’s public keys with a TACK key.

“Having a Microsoft code signing certificate is the Holy Grail of malware writers,” blogged Mikko Hypponen, chief research officer at F-Secure. “This has now happened. I guess the good news is that this wasn’t done by cyber-criminals interested in financial benefit. They could have infected millions of computers. Instead, this technique has been used in targeted attacks, most likely launched by a Western intelligence agency.”

How well do you know your tablets? Take our quiz.