Admin alert: Twice as many digital certificates used to sign malware reported in 2014

According to Kaspersky Lab, the number of untrusted certificates used to sign malicious software doubled in the last year.

FP Staff February 04, 2015 10:26:32 IST
Admin alert: Twice as many digital certificates used to sign malware reported in 2014

By the end of 2014, the company’s antivirus database included more than 6,000 of these certificates. Considering the increase in threats related to signing malicious files, Kaspersky experts advise system administrators and users not to trust digital signatures without question, and not to allow signed files to launch purely on the strength of the signature.

"Virus writers steal and imitate valid signatures to reassure the users and antivirus solutions that the file is safe. Kaspersky Lab has seen this technique used by advanced persistent threat actors for several years,” said Andrey Ladikov, Head of Strategic Research at Kaspersky Lab.

Admin alert Twice as many digital certificates used to sign malware reported in 2014

Representational Image. Reuters

The notorious Stuxnet worm used certificates stolen from Realtek and JMicron. The Winnti gang stole certificates from compromised gaming companies and re-used them in new attacks. Moreover, there are examples of the same certificates being used in attacks launched by other groups of Chinese hackers, suggesting the existence of an underground market. The Darkhotel gang usually signed its backdoors with digital certificates and apparently had access to the secret keys needed to create fake certificates.

It is essential to maintain increased control over signed files with appropriate antivirus protection and comply with security policies. This will reduce the risk of launching new malware that virus scanners do not recognise, and that your computer believes is backed up by a valid digital certificate. Kaspersky Lab recommends the following protocols:

- Impose a ban on launching programs that are digitally signed by an unknown software vendor: most stolen certificates originate from small developers

- When encountering certificates from unknown certification centres, do not install them in the storage.

- Do not grant permission to launch programs signed by trusted certificates purely based on the name of the certificate. Check other attributes such as the serial number and the certificate fingerprint (hash sum).

- Install the Microsoft MS13-098 update - it eliminates the error that can include additional data in the signed file without violating the file signature.

- Use an antivirus solution that has its own database of trusted and untrusted certificates.

Updated Date: