German Researchers Spoof Certificate Authorities
Germany-based researchers found a way to spoof certificates, even those protected with PKI-based domain validation, according to the Register.
With nothing more than a laptop, the group was able to steal credentials and eavesdrop on certificate authorities. “We evaluated the attack against a number of CAs and we set up a live (automated) demo against one CA,” said Dr. Haya Shulman, head of the cyber security, analytics and defenses division at the Fraunhofer Institute for Secure Information Technology.
“Essentially, many CAs that support domain validation can be attacked. We demonstrated an attack which redirects the CA to an attacker machine via DNS cache poisoning," Shulman said.
"But, other techniques can be applied, such as BGP prefix hijack. Indeed, such attacks are common and only recently MyEtherWallet users were attacked via BGP prefix hijack that was then exploited for DNS cache poisoning. Essentially this means that such attacks are happening and an important security mechanism such as the web PKI should be protected against such practical attacks.”
Researchers will present their findings, which name the affected Certificate Authorities (CAs), at the ACM’s Conference on Computer and Communications Security in Toronto on October 15-19, 2018. The goal of sharing the research is not to guard only against their attack findings but to harden the PKI against off-path attackers and to make it secure against man-in-the-middle (MitM) attackers.
“While this attack is relatively complex to pull off, it demonstrates a fundamental problem with Domain Validated (DV) certificates. DV-issued certificates offer the lowest level of identity validation, sacrificing solid identity proof in exchange for speed and automation,” said Justin Hansen, security architect at Venafi.
“The impact of this attack can be quite serious because if an attacker can successfully poison DNS for any domains owned by a targeted organization, they will be able to get a certificate for that organization, and everyone on the internet will trust it. The attacker can then do a whole range of malicious things with that domain.”
Because these types of compromises can occur, Hansen said that organizations should explore higher assurance certificates such as Organization Validation (OV) and Extended Validation (EV).
“As we also argue in the paper, certificate authorities that support Domain Validation (DV) control more than 95% of certificates market,” Shulman said.
“The reason is that the process is faster, cheaper and easier (it is mostly automated). The OV and EV certificates take long to issue, are cumbersome and more expensive (which is why most domains do not use them). It also would not completely mitigate the security issue. Essentially we recommend deploying DV.”
- Senior SOC Analyst
- Up to £55,000 Basic
Senior SOC Analyst is needed to join an established cyber security business. The individual must be able to commute to Surrey / Hampshire area. The Senior SOC Analyst must have current experience working within a cyber security environment with the following experience; Acting as the point of escalations for the team and external clients to help eliminate & prevent security incidents. SIEM monitoring, design & implementation. Developing & Strengthening current client services As the business continues to evolve the board are looking to attract the right candidate to help them to continue to expand their capabilities and offerings. Unfortunately this opportunity is unable to provide sponsorship. Reference Number: CH7421
- Junior Sales Consultant
- Up to £35,000 Base + Double Uncapped OTE
A Junior Sales Consultant is needed for a UK focussed managed service provider in London who have grown by over 25% this year. The Junior Sales Consultant will be responsible for identifying and closing new business opportunities with the Small Medium Enterprise (SME) market. The ideal Junior Sales Consultant will possess; Current experience selling cloud solutions (Azure, AWS etc.) within the SME market. Track record reaching and beating targets. Appetite to learn and make money. Unfortunately our client is unable to sponsor for this role. Reference Number: PG7423
- Technical Support Lead
- Up to £50,000 Basic
A Technical Support Lead is needed to join a organically growing UK focussed managed service provider company in London The Technical Support Lead will be responsible for all things technical support (internal teams & external clients) e.g. 3rd level support, deployments and also growing the current team. The ideal Technical Support Lead will possess; Current experience within a 3rd line support role with a focus on Microsoft technologies (Hyper V, Server, Azure etc.) Certifications such as Microsoft Certified Professional (MCP), Microsoft Certified Solutions Associate (MCSA) or Microsoft Certified Solutions Expert (MCSE) certifications. This would be a great chance for someone in a 3rd Line Support role to take the next step and be given the opportunity to lead and grow a team and join a company who have grown by over 25% this year. Unfortunately our client is unable to sponsor for this role. Reference Number: PG7422
- Cloud Channel Manager
- Up to £75,000 Base dependant on experience + Double OTE
A Cloud Channel Manager is needed for a Leading Cloud Service Provider in London due to increased customer demand. The Cloud Channel Manager will be primarily responsible for rebuilding & protecting current accounts and also new logo sales into the channel e.g. Value Added Resellers (VAR) / Managed Service Providers (MSP), SI etc. Requirements Current experience selling Cloud technology such as AWS / Azure into the channel Over achieved on sales targets. Long tenure (3/4 years+) in current and previous positions. Reference Number: PG7419