{"id":10512,"date":"2017-11-16T10:10:09","date_gmt":"2017-11-16T18:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/16\/news-4284\/"},"modified":"2017-11-16T10:10:09","modified_gmt":"2017-11-16T18:10:09","slug":"news-4284","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/11\/16\/news-4284\/","title":{"rendered":"When you shouldn&#8217;t trust a trusted root certificate"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 16 Nov 2017 17:30:00 +0000<\/strong><\/p>\n<p>Root certificates are the cornerstone of authentication and security in software and on the Internet. They&#8217;re issued by a certified authority (CA) and, essentially, verify that the software\/website owner is who they say they are. We <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/explained-security-certificates\/\" target=\"_blank\" rel=\"noopener\">have talked about certificates<\/a> in general before, but a recent event triggered our desire for further explanation about the ties between malware and certificates.<\/p>\n<p>In a <a href=\"https:\/\/community.rsa.com\/community\/products\/netwitness\/blog\/2017\/11\/03\/inaudible-subversion-did-your-hi-fi-just-subvert-your-pc\" target=\"_blank\" rel=\"noopener\">recent article by RSA FirstWatch,<\/a> we learned that a popular USB audio driver had silently installed a root certificate. This self-signed root certificate was installed in the Trusted Root Certification Authorities store. Under normal circumstances, you would have to agree to \u201cAlways trust software from {this publisher}&#8221; before a certificate would be installed there.<\/p>\n<p>However, the audio driver skipped this step of prompting for approval (hence &#8220;silently&#8221; installing).\u00a0 The silent install was designed to accommodate XP users, but it had the same effect in every Windows operating system from XP up to Windows 10. The installer was exactly the same for every Windows version. Ironically enough, the certificate wasn\u2019t even needed to use the software. It was just introduced to complete the installation on Windows XP seamlessly.<\/p>\n<h3>Why is this a bad thing?<\/h3>\n<p>Root certificates can be installed for purposes such as timestamping, server authentication, code-signing, and so on. But this particular driver installed a certificate valid for \u201cAll\u201d purposes. So any system with these drivers installed from any of the vendors will trust any certificate issued by the same CA\u2014for \u201cAll\u201d purposes. Under normal circumstances, only a certificate issued by Microsoft would have \u201cAll\u201d in the root certificates \u201cIntended Purposes\u201d field.<\/p>\n<p>Having a certificate in the Trusted Root Certification Store for &#8220;All&#8221; intended purposes on a Windows system gives anyone that has the private key associated with the certificate the ability to completely own the system on which it is installed. The impact is the same as for any Certificate Authority (CA) behind certificates installed on Windows systems.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20541\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/TrustedRootCertificates.png\" alt=\"certmgr\" width=\"1026\" height=\"618\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/TrustedRootCertificates.png 1026w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/TrustedRootCertificates-300x181.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/TrustedRootCertificates-600x361.png 600w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><\/p>\n<p>An exception is that in some instances large companies may choose to do the same with the intent to perform SSL decryption at the perimeter for outbound traffic. So, not only does silently adding a root certificate break the hierarchical trust model of Windows. It also gives any owner of the private key that goes with that certificate a lot of options to perform actions on a computer with that certificate installed.<\/p>\n<h3>How can they be abused?<\/h3>\n<p>An attacker who gets ahold of the private key that belongs to a root certificate can generate certificates for his own purposes and sign them with the private key. Any certificate with the root certificate already in their Trusted Root Certification Store on a Windows system will trust any certificate signed with the same private key for \u201cAll\u201d purposes. This applies to software applications, websites, or even email. Anything from a <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/man-in-the-middle-mitm\/\" target=\"_blank\" rel=\"noopener\">Man-in-the-Middle (MitM)<\/a> attack to installing malware is possible. And as if this wasn\u2019t bad enough, <a href=\"http:\/\/www.umiacs.umd.edu\/~tdumitra\/papers\/CCS-2017.pdf\" target=\"_blank\" rel=\"noopener\">security researchers at the University of Maryland<\/a> found that simply copying an authenticode signature from a legitimate file to a known malware sample can cause antivirus products to stop detecting it, even though it results in an invalid signature.<\/p>\n<h4>Methods of abuse<\/h4>\n<p>There are several ways of abusing certificates by criminals. They can:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2013\/02\/digital-certificates-and-malware-a-dangerous-mix\/\" target=\"_blank\" rel=\"noopener\">Abuse existing certificates to appear legitimate<\/a>, which can be disastrous if the threat actors have the private key.<\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2015\/11\/vonteera-adware-uses-certificates-to-disable-anti-malware\/\" target=\"_blank\" rel=\"noopener\">Drop legitimate certificates in the Untrusted Certificate store<\/a>, so legitimate programs are no longer able to run, or certain websites are no longer accessible.<\/li>\n<li><a href=\"https:\/\/www.theregister.co.uk\/2017\/11\/01\/digital_cert_abuse\/\" target=\"_blank\" rel=\"noopener\">Create or buy bogus certificates for code-signing<\/a>.<\/li>\n<\/ul>\n<p>Of all these methods, it stands to reason that stolen certificates, especially those intended for \u201cAll\u201d purposes, are the most dangerous. So introducing one of these just because you want to install a driver or to <a href=\"http:\/\/news.softpedia.com\/news\/second-dell-root-certificate-discovered-496683.shtml\" target=\"_blank\" rel=\"noopener\">enable easier customer support<\/a>, and not letting the user know, is inadvisable at best.<\/p>\n<p>If you think that the number of certificates in use by malware authors can&#8217;t be that large, have a look at the suspects that have been <a href=\"http:\/\/www.ccssforum.org\/malware-certificates.php\" target=\"_blank\" rel=\"noopener\">reported at the CCSS forum<\/a>.<\/p>\n<h3>How can I remove certificates I don\u2019t need or trust?<\/h3>\n<p>A list of known signing certificates that are being abused by threat actors has been made available at <a href=\"http:\/\/signedmalware.org\" target=\"_blank\" rel=\"noopener\">signedmalware.org<\/a>. As explained earlier, using signing certificates gives criminals a lot of options to bypass system protection mechanisms, which is why you might want to remove those from your machine. There is also a <a href=\"https:\/\/superfish.tlsfun.de\" target=\"_blank\" rel=\"noopener\">test site<\/a> where you can check if any of the software programs that are open to an MitM attack are active on your system.<\/p>\n<p>To delete a trusted root certificate:<\/p>\n<ul>\n<li>Open the certificates snap-in for a user, computer, or service. You can do this by running <strong>certmgr.msc <\/strong>from your Run\/Searchprograms box or from a command prompt.<\/li>\n<li>Select <strong>Trusted Root Certification Authorities.<\/strong><\/li>\n<li>Under this selection, open the <strong>Certificates <\/strong>store.<\/li>\n<li>In the details pane on the right-hand side, select the line of the certificate that you want to delete. (To select multiple certificates, hold down control and click each certificate.)<\/li>\n<li>Right click the selection you made and in the action menu, click <strong>delete<\/strong>.<\/li>\n<li>Confirm your choice by clicking <strong>y<\/strong><strong>es<\/strong>\u00a0if you are completely sure that you want to permanently delete the certificate.<\/li>\n<\/ul>\n<p>Please note that user certificates can be managed by the user or by an administrator. Certificates issued to a computer or service can only be managed by an administrator or user who has been given the appropriate permissions.<\/p>\n<p>You might want to back up the certificate by exporting it before you delete it. For the procedure to export a certificate, see <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/cc730988.aspx\" target=\"_blank\" rel=\"noopener\">export a certificate<\/a>.<\/p>\n<p>If you want to look at the Thumbprint, aka serial number, of the certificates, you can use this Powershell command to list the non-Microsoft certificates in the Trusted Root Certification Authorities:<br \/> <code><br \/> Get-ChildItem -Path cert:currentuserAuthRoot -Recurse | select Thumbprint, FriendlyName, Subject | ConvertTo-Html | Set-Content c:userspublicdesktopcertificates.html<\/code><\/p>\n<p>This will create a html file on the public desktop that shows the list by Thumbprint (in reverse order) and where you can look up the <strong>Friendly Name <\/strong>and <strong>Subject<\/strong> that belongs to a <strong>Thumbprint<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20542\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/TrustedRootCertificatesbyThumbprint.png\" alt=\"exported certificates list\" width=\"1896\" height=\"448\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/TrustedRootCertificatesbyThumbprint.png 1896w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/TrustedRootCertificatesbyThumbprint-300x71.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/TrustedRootCertificatesbyThumbprint-600x142.png 600w\" sizes=\"auto, (max-width: 1896px) 100vw, 1896px\" \/><\/p>\n<p>For those that do like to keep an eye on things, there is a <a href=\"https:\/\/isc.sans.edu\/diary\/rss\/23030\" target=\"_blank\" rel=\"noopener\">guide by Xavier Mertens<\/a>\u00a0for a piece of code that alerts you about changes in the certificate store.<\/p>\n<h3>Conclusion<\/h3>\n<p>Since root certificates are intended to heighten security, it should be clear to those issuing them that they should be treated as such, and not as something that they can install willy-nilly whenever it suits their needs. The whole point of prompting users is to establish a chain of trust that they should be able to rely on. And in this case, the prompt was bypassed only to enable installation on a no-longer-supported operating system. That both ruins user trust and introduces unnecessary security risk for a rather shallow reason.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2017\/11\/when-you-shouldnt-trust-a-trusted-root-certificate\/\">When you shouldn&#8217;t trust a trusted root certificate<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2017\/11\/when-you-shouldnt-trust-a-trusted-root-certificate\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 16 Nov 2017 17:30:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/technology\/2017\/11\/when-you-shouldnt-trust-a-trusted-root-certificate\/' title='When you shouldn't trust a trusted root certificate'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/worteldiploma.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A trusted root certificate is the cornerstone of authentication and security in software and on the Internet. But even this can be abused by criminals. Learn when you shouldn&#8217;t trust these trusted sources.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/technology\/\" rel=\"category tag\">Technology<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/certificate-authority\/\" rel=\"tag\">certificate authority<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/certificates\/\" rel=\"tag\">certificates<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/driver-root-certificates\/\" rel=\"tag\">driver root certificates<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/root-certificates\/\" rel=\"tag\">root certificates<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/technology\/2017\/11\/when-you-shouldnt-trust-a-trusted-root-certificate\/' title='When you shouldn't trust a trusted root certificate'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2017\/11\/when-you-shouldnt-trust-a-trusted-root-certificate\/\">When you shouldn&#8217;t trust a trusted root certificate<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[16670,13240,4503,16671,16672,1331],"class_list":["post-10512","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-certificate-authority","tag-certificates","tag-cybercrime","tag-driver-root-certificates","tag-root-certificates","tag-technology"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10512"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10512\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10512"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}