Microsoft issued an update on 3 June to address a certificate issue exploited in the Flame malware attacks.
Flame, which was publicised by security researchers last week, is a cyber-espionage toolkit that incorporates a wide range of functionality, including intercepting web traffic, recording audio and taking screenshots.
According to Microsoft, components of Flame use were signed with an unauthorised digital certificate that chained up to a Microsoft sub-certification authority issued under the Microsoft Root Authority. This happened via the Terminal Server Licensing Service, which Microsoft operates to issue certificates to customers for “ancillary PKI- [public-key infrastructure-] based functions” in their enterprise.
By signing malware with fake certificates, attackers can trick browsers and applications into trusting malicious content, enabling activities such as phishing and man-in-the-middle attacks.
“What we found is that certificates issued by our Terminal Services licensing certification authority, which are intended to only be used for licence server verification, could also be used to sign code as Microsoft. Specifically, when an enterprise customer requests a Terminal Services activation licence, the certificate issued by Microsoft in response to the request allows code signing without accessing Microsoft’s internal PKI infrastructure.”
“As soon as we discovered the root cause of this issue, we immediately began building an update to revoke the trust placed in the ‘Microsoft Enforced Licensing Intermediate PCA’ and ‘Microsoft Enforced Licensing Registration Authority CA’ signing certificates,” Ness wrote.
“That update is available today through Windows Update and Automatic Updates. This update places three certificates into the Windows Untrusted Certificate Store. We have also discontinued issuing certificates usable for code signing via the Terminal Services activation and licensing process.”
The use of unauthorised certificates is another link between Flame malware and Stuxnet and Duqu, which both used fraudulent or stolen certificates. Just recently, researchers Moxie Marlinspike and Trevor Perrin outlined a proposal they called TACK, or Trust Assertions for Certificate Keys, which they contend can help address the problem of spoofed Secure Sockets Layer (SSL) certificates by enabling a site to sign its TLS server’s public keys with a TACK key.
“Having a Microsoft code signing certificate is the Holy Grail of malware writers,” blogged Mikko Hypponen, chief research officer at F-Secure. “This has now happened. I guess the good news is that this wasn’t done by cyber-criminals interested in financial benefit. They could have infected millions of computers. Instead, this technique has been used in targeted attacks, most likely launched by a Western intelligence agency.”
How well do you know your tablets? Take our quiz.
To settle US federal and state claims over multiple data breaches, Marriott International agrees $52…
ByteDance's TikTok is laying off up to 500 employees as it moves to greater use…
In this episode, we uncover why most organisations aren’t ready to harness generative AI. We…
Mixed reactions as Elon Musk hypes $30,000 'self driving' robotaxi called Cybercab, as well as…
AMD unveils new AI and data centre chips as it seeks to improve challenge to…
AT&T and Verizon among US broadband providers reportedly hacked to target American government wiretapping platform