A Netherlands company has stopped issuing SSL certificates due to concerns about the possible breach of a Website used to buy certificates.
Officials at telecommunications company KPN (formerly Getronics) said in a statement that though existing certificates remain valid, the company has temporarily halted the issuing of new certificates pending an investigation into the possible compromise. In a recent audit it was revealed the server of the Website may have been prepped four years ago by an attacker for use in a distributed denial of service attack (DDos).
Although there is no evidence bogus certificates were produced, the company cannot rule it out, the company said. The investigation into the situation is ongoing.
The situation at KPN is another in a series of incidents in 2011 that have brought the security of certificate authorities (CAs) into the spotlight. With a fraudulent certificate in tow, an attacker can potentially make it appear Web surfers are visiting a legitimate site even if they are actually visiting a malicious one. On Nov. 3, Microsoft and Mozilla announced they were revoking trust in certificates issued by Malaysian CA Digicert after it was discovered its certificates used weak 512-bit keys and were missing certain certificate extensions. Digicert has no relation to DigiCert Inc., based in Utah.
In March, an attacker hit a Comodo affiliate registration authority and stole the username and password for a trusted Comodo partner. As a result of the compromise, the attacker was able to create a new user account that generated nine fraudulent certificates for several popular Websites, including Google, Yahoo and Microsoft’s Hotmail.
Five months later, certificate authority DigiNotar admitted it had been hacked earlier in the year. In the ensuing fallout, browser vendors revoked hundreds of bogus SSL certificates that were issued by DigiNotar. The situation ultimately forced the company to declare bankruptcy in September.
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
