Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Let’s Encrypt Issues 15,000 Fraudulent “PayPal” Certificates Used for Cybercrime

Free and open Certificate Authority (CA) Let’s Encrypt has issued nearly 15,000 certificates containing the term “PayPal” for phishing sites to date, a security researcher has discovered.

Free and open Certificate Authority (CA) Let’s Encrypt has issued nearly 15,000 certificates containing the term “PayPal” for phishing sites to date, a security researcher has discovered.

According to encryption expert Vincent Lynch, 96.7% of the 15,270 security certificates containing the term PayPal that Let’s Encrypt has issued since March last year have been issued for phishing sites. Most of these certificates have been issued since November 2016.

Launched publicly in December 2015 and out of beta in April 2016, Let’s Encrypt is an initiative built on the idea of encrypting websites and serving them over Transport Layer Security (TLS), thus protecting users’ data from eavesdroppers. The CA’s certificates are offered for free, and the issuance and maintenance processes are automated, to make it easier for website owners to obtain certificates.

Even before being launched, Let’s Encrypt fueled fears that it could be abused by cybercriminals for their nefarious purposes. What’s more, the CA claims that it is not its job to stop malicious sites from using its certificates, meaning that phishers can use its certificates without fearing they might be banned, Lynch notes.

“Despite the concerns of many around the industry, Let’s Encrypt’s stance is in full compliance with industry standards. Regardless, that policy in combination with offering free certificates does create a very attractive environment for phishers,” he says.

In early March, the encryption expert urged Let’s Encrypt to stop issuing PayPal certificates because of their use for phishing. At the time, he estimated that the CA had issued 988 certificates containing the term PayPal, and that 99.5% of them were being used (or had been used) for phishing.

Now, based on newly received data, Lynch says that the previous number was a great underestimation and that Let’s Encrypt actually issued a total of 15,270 SSL certificates containing the word “PayPal,” 14,766 of which were (or are) used for phishing. The estimation is based on the analysis of a random sample of 1,000 certificates, 96.7% of which were intended for use on phishing sites.

The number of PalPal certificates issued by Let’s Encrypt has been growing at a steady rate of around 1250 per month since November last year, which was also the first month during which more than 1000 such certificates were issued (and twice the amount issued during the previous month). Thus, the CA issued 2530 PayPal certificates in December 2016, 3995 in January 2017, and 5101 in February 2017.

Advertisement. Scroll to continue reading.

According to Lynch, there’s no apparent specific cause for the increase. However, it seems that the issuance rate has started to decline this month. Even so, Let’s Encrypt is expected to issue 20,000 additional PayPal certificates by the end of this year.

Phishing sites usually have a very short lifespan, mainly because they tend to be flagged and blocked rather fast, which explains why cybercriminals tend to register as many of them as possible. Making them look as legitimate as possible also helps these sites stay alive for longer.

“The various initiatives encouraging HTTPS are likely to appeal to phishers as well. There are a number of performance benefits (such as HTTP/2) only available to sites using HTTPS. In addition, sites using valid SSL certificates are given trusted UI indicators by browsers (the padlock icon in all browsers, the “Secure” label in Chrome) which make a phishing site look more legitimate,” Lynch notes.

In a mailed comment, Ilia Kolochenko, CEO of web security company High-Tech Bridge, told SecurityWeek that he agrees that CAs shouldn’t be responsible with the blocking of malicious websites from getting security certificates.

“I think we should separate HTTP traffic encryption and website identity verification questions. Let’s Encrypt’s mission is to globally convert plaintext HTTP traffic to encrypted HTTPS traffic, and they are doing it pretty well. Nonetheless, they should have foreseen massive abuse by phishers, and implement at least some basic security verifications, such as refusing SSL certificates for domains that contain popular brand names inside,” he said.

According to Kolochenko, the fact that web browsers mark HTTPS sites as trusted is actually a bigger issue in this regard, because they encourage users to blindly trust the website without any justifiable reason. Because of that, he says, it’s rather difficult to measure whose carelessness contributed more to the increase in phishing campaigns.

However, he also voiced fears that the idea of encrypting all web traffic could result in malware being able to bypass security mechanisms more efficiently:

“I am quite sure that if we will see how many of Let’s Encrypt SSL certificates are used by malware to exfiltrate stolen data – results will be pretty scary. Therefore, it’s difficult to predict how Let’s Encrypt will shape its growth strategy in the future to preclude cybercriminals from abusing its desire to make the web safer.”

Representatives from the Linux Foundation (the group behind the Let’s Encrypt project) did not immediately respond to a request for comment.

Related: PayPal Users Targeted in Sophisticated Phishing Attack

Related: PayPal Phishing Attack Immediately Verifies Credentials

Related: Let’s Encrypt’s Free Certificates Abused by Cybercriminals

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.