Current category:General&Malware

Fraudulent SSL Certificates

On the 15th March 2011, a security industry nightmare happened: Comodo affiliate RA was compromised, resulting in the issue of nine fraudulent SSL certificates. Comodo issued a full-disclosure statement on their blog.

In and of itself, companies are compromised all of the time, but the fake certificates – now revoked – were for large traffic sites like yahoo, gmail, Skype and Hotmail (amongst others). Microsoft has issued a patch to block the fake certificates.

The fake certificates were for:

  4. (3 certificates)
  7. “Global Trustee”

The OS patch from Microsoft covers all currently supported operating systems:

  1. Windows XP Service Pack 3
  2. Windows XP Professional x64 Service Pack 2
  3. Windows Server 2003 Service Pack 2 (including for Itanium-based systems)
  4. Windows Vista SP1 / SP2 (including x64 systems)
  5. Windows Server 2008 (32-bit, x64 systems and Itanium-based systems)
  6. Windows 7 (32-bit and x64 systems with SP1)
  7. Windows Server 2008 R2 (for x64 and Itanium-based systems with SP1)

We strongly urge all users and systems administrators to patch their systems immediately.

The compromise also highlights the importance of ongoing system security. Although the compromise was unusual, in that it required high-level DNS access to achieve, and is thought to have originated in Iran, it also shows the value in keeping systems patched (as the industry provides solutions relatively quickly, but administrators are often behind in adding new patches to the OS), running up-to-date security software and being aware of unusual systems activity.

It is unclear, at this time, if any users were actually affected by this incident.

GD Star Rating

About Justin Bellinger

Justin is an experienced software professional, having worked in software and software security for nearly 20 years. Justin is VP of Security Products at SPAMfighter.
This entry was posted in General, Malware and tagged , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *