German Researchers Spoof Certificate Authorities

Germany-based researchers found a way to spoof certificates, even those protected with PKI-based domain validation, according to the Register.
With nothing more than a laptop, the group was able to steal credentials and eavesdrop on certificate authorities. “We evaluated the attack against a number of CAs and we set up a live (automated) demo against one CA,” said Dr. Haya Shulman, head of the cyber security, analytics and defenses division at the Fraunhofer Institute for Secure Information Technology.
“Essentially, many CAs that support domain validation can be attacked. We demonstrated an attack which redirects the CA to an attacker machine via DNS cache poisoning," Shulman said.
"But, other techniques can be applied, such as BGP prefix hijack. Indeed, such attacks are common and only recently MyEtherWallet users were attacked via BGP prefix hijack that was then exploited for DNS cache poisoning. Essentially this means that such attacks are happening and an important security mechanism such as the web PKI should be protected against such practical attacks.”
Researchers will present their findings, which name the affected Certificate Authorities (CAs), at the ACM’s Conference on Computer and Communications Security in Toronto on October 15-19, 2018. The goal of sharing the research is not to guard only against their attack findings but to harden the PKI against off-path attackers and to make it secure against man-in-the-middle (MitM) attackers.
“While this attack is relatively complex to pull off, it demonstrates a fundamental problem with Domain Validated (DV) certificates. DV-issued certificates offer the lowest level of identity validation, sacrificing solid identity proof in exchange for speed and automation,” said Justin Hansen, security architect at Venafi.
“The impact of this attack can be quite serious because if an attacker can successfully poison DNS for any domains owned by a targeted organization, they will be able to get a certificate for that organization, and everyone on the internet will trust it. The attacker can then do a whole range of malicious things with that domain.”
Because these types of compromises can occur, Hansen said that organizations should explore higher assurance certificates such as Organization Validation (OV) and Extended Validation (EV).
“As we also argue in the paper, certificate authorities that support Domain Validation (DV) control more than 95% of certificates market,” Shulman said.
“The reason is that the process is faster, cheaper and easier (it is mostly automated). The OV and EV certificates take long to issue, are cumbersome and more expensive (which is why most domains do not use them). It also would not completely mitigate the security issue. Essentially we recommend deploying DV.”
Source infosecuritymagazine

Latest Jobs
-
- Contract (outside) Cyber Incident manager – current SC clearance ESSENTIAL
- United Kingdom
- N/A
-
Contract (outside) Cyber Incident manager – current SC clearance ESSENTIAL Outside IR35 Client facing (Remote UK) with occasional site visit. Must have current Cyber incident response / management experience. Both proactive planning, escalation, coordination and coordinating response. Stakeholder engagement both technical and non technical teams. Prior experience with Technical incident / digital forensics / crisis management. Immediate role.
-
- Tenable Vulnerability Analyst - CONTRACT outside IR35. SC cleared.
- United Kingdom
- N/A
-
6 month rolling contract Outside IR35- immediate start. Threat and Vulnerability Analyst. Tenable.sc experience needed. The ability to deploy agent, configure environments, run active and passive scans, produce reports and prioritise remediation activities based on output Current and ACTIVE SC clearance is required
-
- ForgeRock Consultant
- N/A
- £600 per day
-
ForgeRock Consultant required for 6 Month Contract (with potential to extend) Outside IR35, Must be willing to work Europe hours (GMT+1) This is a remote position, Looking for a lead ForgeRock Technical Consultant with strong experience of ForgeRock to lead the next phase of deployment. Good understanding of ForgeRock Directory Services. · Responsible for the design and implementation of ForgeRock stack · Install and configure ForgeRock stack to meet customer authentication and authorization requirements, · Design and implement OAuth2 protocol using ForgeRock OpenAM, · Design and develop OpenAM custom authentication modules, · Configure ForgeRock stack to protect RESTful API, · Troubleshoot and support ForgeRock IAM stack. · Designed and developed Restful APIs, This is a great project with an expanding ForgeRock Partner, where you will get to work on some high level deployment projects We are looking for someone with the above experience, who is comfortable hitting the ground running and taking on the reins mid project
-
- Network Security Engineer
- Germany
- €550 a day
-
German- based contract opportunity This is an onsite based position, we would need the Network Security engineer to be able to work on the client site 5 days a week Seeking an experienced Network Security Engineer for a leading technology company. Strong expertise in firewall/IPS solutions, proxy solutions, and certificate management is required. Good hands-on experience in networking and web-related technologies necessary. Strong problem-solving skills and the ability to work under pressure are essential. we are looking for a Network Security Engineer with the following experience: · Expertise in Administration, Management & Troubleshooting of Firewall / IPS solutions / Proxy solutions/Certificate Management Solutions · Good Hands-on Experience on security devices (PaloAlto/ /McAfee Proxy/CISCO ISE/Certificate Management) · Good Hands-on Experience in Networking with skills of switching, routing & wireless Technologies · Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocol · Configuration of NAT / PAT, firewall policies, profiling, objects, AD-Integration, backup – restore · Knowledge of Subnetting TCP/IP Communication, VLSM Configuration of VLAN VTP · Configuration of Routing Protocols e.g. RIPv1 & v2, OSPF, EIGRP, BGP Knowledge of standard and extended ACL 12 month contract