Saturday, June 25, 2011

'Iranian' attackers forge Google's Gmail credentials • The Register

'Iranian' attackers forge Google's Gmail credentials

by Dan Goodin, theregister.co.uk
March 23rd 2011 8:12 PM

Extremely sophisticated hackers, possibly from the Iranian government or another state-sponsored actor, broke into the servers of a web authentication authority and counterfeited certificates for Google mail and six other sensitive addresses, the CEO of Comodo said.

The March 15 intrusion came from IP addresses belonging to an Iranian internet service provider, and one of the purloined certificates was tested from the same country, said Melih Abdulhayoglu, whose company is the certificate authority used to validate the bogus web credentials. Other web addresses that were targeted included www.google.com, login.yahoo.com, login.skype.com, addons.mozilla.com, and Microsoft's login.live.com.

“All the IPs were from Iran, and this was critically executed,” Abdulhayoglu told The Register. “It wasn't like a brute-force attack like you would see from a typical cyber criminal. It was a very well orchestrated, very clinical attack, and the attacker knew exactly what they needed to do and how fast they had to operate.”

The intrusion on what amounts to a reseller of Comodo certificates allowed the attackers to obtain the encryption keys needed to create SSL, or secure socket layer, certificates that web browsers and email programs use to mathematically determine that the server they're connected to belongs to its true owner, rather than an imposter. The attack came around the same time that unknown parties compromised the security of RSA's SecurID, the matchbook-sized tokens that 40 million people use to secure logins to sensitive and corporate networks.

“The security companies who are providing authentication are being directly attacked by the government,” Abdulhayoglu said. “All of us provide some sort of security, some sort of authentication, to people and we're being attacked. The reason is these people (the attackers) want to have access to communication.”

Comodo revoked the forged certificates almost immediately after discovering they had been issued. That would cause most modern browsers to warn of a forgery when encountering them. But older browsers don't provide such warnings, and the validation check can be turned off, both of which create the possibility that people visiting the targeted websites on unsecured networks could have been duped by the counterfeited certificates.

Google very quietly blacklisted “a small number of certificates” two days after the attack, and Mozilla and Microsoft took similar action for Firefox or Internet Explorer until Tuesday and Wednesday respectively.

Abdulhayoglu declined to identify the reseller, which in SSL parlance is known as a registration authority, except to say that it was based in southern Europe. Comodo still doesn't know how the RA was breached but investigators have determined that other non-Comodo accounts held by the partner were also compromised around the same time.

Abdulhayoglu said he could neither confirm nor deny that the breaches were related to, or aided by, the compromise of RSA's SecurID.

Next page: Who knew what, when?

Original Page: http://www.theregister.co.uk/2011/03/23/gmail_microsoft_web_credential_forgeries/

Shared from Read It Later

Elyssa Durant, Ed.M. 

United States of America 

Forgive typos! iBLAME iPhone

Posted via email from Whistleblower

No comments:

Post a Comment