Menu
Malvertising campaign used a free certificate from Let's Encrypt

Malvertising campaign used a free certificate from Let's Encrypt

The organization says revoking certificates isn't the answer to abuse

Cybercriminals are taking advantage of an organization that issues free digital certificates, sparking a disagreement over how to deal with such abuse.

On Wednesday, Trend Micro wrote that it discovered a cyberattack on Dec. 21 that was designed to install banking malware on computers.

The cybercriminals had compromised a legitimate website and set up a subdomain that led to a server under their control, wrote Joseph Chen, a fraud researcher with Trend.

If a user went to the site, the subdomain would show a malicious advertisement that would redirect the user to sites hosting the Angler exploit kit, which looks for software vulnerabilities in order to install malware.

The subdomain used an SSL/TLS (Secure Sockets Layer/Transport Layer Security) certificate, which encrypts traffic between a server and a user's computer.

The certificate was issued by Let's Encrypt, a project that is run by the ISRG (Internet Security Research Group) and is backed by Mozilla, the Electronic Frontier Foundation, Cisco, and Akamai, among others.

Let's Encrypt is the first large-scale project to issue free digital certificates, part of a broad movement to improve security across the Internet.

Chen wrote that Trend Micro had been anticipating that cybercriminals would try to get free certificates from Let's Encrypt for their own malicious purposes. In this case, encrypting traffic to the malicious server better masks the cybercriminals' activities.

It is possible to revoke digital certificates. However, Let's Encrypt had decided as policy not to revoke certificates. In October, the organization explained that certification authorities (CAs) are not equipped to police content.

But Let's Encrypt does check with Google's Safe Browsing API to see if a domain for which a certificate is requested has been flagged for phishing or malware.

Chen disagrees with this approach, writing, "CAs should be willing to cancel certificates issued to illicit parties that have been abused by various threat actors."

Josh Aas, ISRG's executive director, wrote via email that although the certificate in question could be used again, it's unlikely the cybercriminals would get very far because the domains are known malvertising sites.

The attackers could still just generate new certificates for different domains, and those actions would be difficult for any CA to stop, he wrote.

"CAs cannot detect and respond quickly enough," he wrote.

An alternative approach would be for online ad brokers to implement internal controls to stop malicious ads, Aas wrote.

The online advertising industry has recognized the problems with malicious ads, but cybercriminals use a variety of techniques to sneak harmful ones in.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Slideshows

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise

Ingram Micro completed its nationwide roadshow in Auckland last month, kicking off its Innovation Hour series with Hewlett Packard Enterprise. Uncovering the latest in storage, networking and servers, the event outlined key market trends for resellers in 2016 and beyond.

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise
IN PICTURES: FireEye celebrates channel at 2016 Partner Conference

IN PICTURES: FireEye celebrates channel at 2016 Partner Conference

FireEye welcomed 143 channel partners and distributors to FireEye's 2016 annual Partner Conference, FireEye A/NZ Momentum - held at Establishment in Sydney. Delegates heard from senior trans-Tasman channel leaders, marketing and the product divisions in the morning, with FireEye customers, incident responders and threat intelligence analysts sharing knowledge during the afternoon.

IN PICTURES: FireEye celebrates channel at 2016 Partner Conference
​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​

​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​

With New Zealand businesses now open to innovation, the industry sits on the cusp of significant disruption in the data centre. Driven by software-defined networking, the future of the data centre is fast becoming reality, as the channel seeks to keep up, keep innovating and keep growing. APC by Schneider Electric, Lenovo and key partners outlined how the channel can capitalise at The Grill restaurant in Auckland.

​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​
Show Comments