Menu
Malware authors quickly adopt SHA-2 through stolen code-signing certificates

Malware authors quickly adopt SHA-2 through stolen code-signing certificates

Malware pushers have adapted to new Windows restrictions on files signed with SHA-1-based digital certificates

As the IT industry is working to phase out the aging SHA-1 hashing algorithm it's not just website owners and software developers who are scrambling to replace their digital certificates: Cybercriminals are following suit too.

Researchers from Symantec have recently found new samples of the Carberp.B online banking Trojan that were digitally signed with not one, but two stolen certificates: one using a SHA-1 signature and one using a SHA-2 signature.

"It can be safely surmised that the malware author used certificates containing differing algorithms with the hope of thwarting detection," the Symantec researchers said in a blog post.

The SHA-1 hashing function is in the process of being retired because it is theoretically vulnerable to attacks that could result in forged digital certificates and it's only a matter of time before someone gains the capability to do this.

Last year Microsoft made changes to its crypto libraries so that Windows 7 and higher and Windows Server will no longer trust code signed with a SHA-1 based certificate if its timestamp is later than Jan. 1, 2016. The restriction applies only to files that Windows flags as being obtained from the Internet, which is the case for most malware.

Digitally-signed malware used to be a rare occurrence, but over the past couple of years the number of such programs has increased in response to operating systems making it harder to run non-signed files.

For example, Windows displays User Account Control (UAC) security warnings for unsigned executable files that try to gain administrator privileges while the latest versions of Apple's Mac OS X only allow applications to run if they have been downloaded from the Mac App Store or if they have been signed with a developer certificate obtained from Apple.

Aside from bypassing these restrictions, cybercriminals have also figured out that having multiple digital signatures on a single file can have other benefits.

Since the certificates used to sign malware are typically stolen from legitimate organizations and not bought by the attackers themselves, the likelihood of those thefts being discovered and the certificates being revoked by their legitimate owners is high. Having two signatures on a single file ensures that even if one certificate is revoked, the file will still appear as trusted thanks to the other signature.

"The attacks with Carberp also point to a shift towards using digital certificates with SHA-2," the Symantec researchers said. "While the move from SHA-1 to SHA-2 may not be instant because legacy systems do not support the newer algorithm, these attacks do indicate that change is on the way."

Users shouldn't allow files to run just because they appear to be signed with a valid certificate. How the file was obtained is always more important than its signature, because here's always the possibility that a legitimate developer was compromised and had his code-signing certificate stolen.

As digital certificates have become valuable targets for cybercriminals, it is important for owners of such certificates to maintain strong cybersecurity practices and make sure that they are stored securely.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
​What are the top 10 tech trends for New Zealand in 2017?

​What are the top 10 tech trends for New Zealand in 2017?

Digital Transformation (DX) has been a critical topic for business over the last few years and IDC is now predicting a step change as DX reaches macroeconomic levels. By 2020 a DX economy will emerge and it will become the core of what New Zealand industries focus on. From the board level through to the C-Suite, Kiwi organisations must be prepared to think and act digital when the DX economy emerges in 2017.

​What are the top 10 tech trends for New Zealand in 2017?
Top 15 Kiwi tech storylines to follow in 2017

Top 15 Kiwi tech storylines to follow in 2017

​The New Year brings the usual new round of humdrum technology predictions, glaringly general, unashamedly safe and perpetually predictable. But while the industry no longer sees value in “cloud is now the norm” type projections, value can be found in following developments of the year previous, analysing behaviours and patterns to formulate a plan for the 12 months ahead. Consequently, here’s the top Kiwi tech storylines to follow in 2017...

Top 15 Kiwi tech storylines to follow in 2017
Show Comments