{"id":8637,"date":"2017-08-08T11:10:02","date_gmt":"2017-08-08T19:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/08\/08\/news-2410\/"},"modified":"2017-08-08T11:10:02","modified_gmt":"2017-08-08T19:10:02","slug":"news-2410","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/08\/08\/news-2410\/","title":{"rendered":"Explained: security certificates"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Tue, 08 Aug 2017 18:17:21 +0000<\/strong><\/p>\n<p>As a result of my PowerShell series [<a href=\"https:\/\/blog.malwarebytes.com\/101\/how-tos\/2017\/07\/learning-powershell-the-basics\/\" target=\"_blank\" rel=\"noopener\">1<\/a>],[<a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/08\/learning-powershell-some-basic-commands\/\" target=\"_blank\" rel=\"noopener\">2<\/a>],[<a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/08\/learning-powershell-basic-programs\/\" target=\"_blank\" rel=\"noopener\">3<\/a>], where I used the handling of certificates as an example, mainly because I wanted a method to keep track easier of which certificates were being added by malware, I&#8217;ve have received some questions about how security certificates work and how they stopped our software from working.<\/p>\n<p>First, it helps to take a look at your own certificates. Go ahead and open the Microsoft Certificates Management Console. You can do this by typing <strong>certmgr.msc <\/strong>in the search field of your start button. You will have to do this as an administrator of the system.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19211\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/certmgrmsc.png\" alt=\"\" width=\"760\" height=\"349\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/certmgrmsc.png 760w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/certmgrmsc-300x138.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/certmgrmsc-600x276.png 600w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><\/p>\n<p>You should see an overview of your certificates divided up into categories. The most used and usually the most important categories are Trusted Root Certification Authorities and Untrusted Certificates.<\/p>\n<h2>What are these certificates?<\/h2>\n<p>Root certificates are a method to prove that a communication you are receiving (from a website, by mail, or otherwise) comes from the source that it claims to be. This is done by <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2013\/09\/encryption-types-of-secure-communication-and-storage\/\" target=\"_blank\" rel=\"noopener\">public key encryption<\/a> to establish a trust between the holders of the public and the private keys. But since it would be impossible to store certificates for every site we&#8217;ve ever visited or wish to visit, the system of certificate authorities (CA) was set up. To establish trust that a certificate is genuine, it is digitally signed by a root certificate belonging to a trusted certificate authority. Operating systems and browsers maintain lists of trusted CA root certificates so they can easily verify that they have been issued and signed.<\/p>\n<p>You may have seen prompts warning you about a website\u2019s security certificate, or as in the example below, a mismatch between the certificate and the name of the site:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19212\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/invalidsitecertificate.png\" alt=\"\" width=\"522\" height=\"387\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/invalidsitecertificate.png 522w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/invalidsitecertificate-300x222.png 300w\" sizes=\"auto, (max-width: 522px) 100vw, 522px\" \/><\/p>\n<p>The image shows which checks have been made before allowing a free exchange of information:<\/p>\n<ul>\n<li>Can we trust the source of the certificate?<\/li>\n<li>Is the certificate still valid? They all have a starting and an expiration date.<\/li>\n<li>Is the name valid, and does the name on the certificate match the name on the site\u2019s certificate?<\/li>\n<li>Is the <a href=\"https:\/\/blog.mozilla.org\/security\/2014\/09\/23\/phasing-out-certificates-with-sha-1-based-signature-algorithms\/\" target=\"_blank\" rel=\"noopener\">signature strong enough<\/a>?<\/li>\n<\/ul>\n<p>Another important check needs to be done, however. Has the certificate been revoked? Sometimes the CA revoke certificates, mainly because the certificate, or the private key, has been stolen or compromised. This check is made against the Certificate Revocation List (CRL), which is a system that unfortunately has some flaws, meaning sometimes the check is not completed.<\/p>\n<h2>Untrusted certificates<\/h2>\n<p>As we <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2015\/11\/vonteera-adware-uses-certificates-to-disable-anti-malware\/\" target=\"_blank\" rel=\"noopener\">have seen in the past<\/a>, certain types of malware place certificates in the <strong>Untrusted<\/strong> category, which basically disables users from downloading and using security software to remove the malware. Below you can see that the Malwarebytes certificate was placed in the <strong>Untrusted<\/strong> category by the Wdfload malware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19213\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/revokedbymalware.png\" alt=\"\" width=\"419\" height=\"521\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/revokedbymalware.png 419w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/revokedbymalware-241x300.png 241w\" sizes=\"auto, (max-width: 419px) 100vw, 419px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>This certificate, however, has nothing to do with our website. Instead, it&#8217;s associated with our software. With the certificate above in the <strong>Untrusted<\/strong> category, this is what you will see if you try to run our software.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19214\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/UnableToService.png\" alt=\"\" width=\"236\" height=\"120\" \/><\/p>\n<p>Even though the CA (DigiCert) did not revoke our certificate and can still be found under our Trusted Root Certification Authorities, the Malwarebytes certificate was listed as revoked by the malware. We have to remove the certificate shown above from the <strong>Untrusted<\/strong> category before we can use the software again.<\/p>\n<p>So there you have it: a brief explanation of how security certificates work and how malware can abuse the certificates system to block you from downloading and\/or running your favorite software.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/explained-security-certificates\/\">Explained: security certificates<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/explained-security-certificates\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Tue, 08 Aug 2017 18:17:21 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/explained-security-certificates\/' title='Explained: security certificates'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/shutterstock_452997847.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Do you want to know how security certificates work and let us show you how malware can abuse the certificates system to block you from downloading and\/or running your favorite software.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/technology\/\" rel=\"category tag\">Technology<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/pieter-arntz\/\" rel=\"tag\">Pieter Arntz<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/security-certificates\/\" rel=\"tag\">security certificates<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trusted-root\/\" rel=\"tag\">trusted root<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/unable-to-connect-to-the-service\/\" rel=\"tag\">unable to connect to the service<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/untrusted\/\" rel=\"tag\">untrusted<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wdfload\/\" rel=\"tag\">WDFLoad<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/explained-security-certificates\/' title='Explained: security certificates'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/explained-security-certificates\/\">Explained: security certificates<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10523,13447,10497,1331,13448,13449,13450,12943],"class_list":["post-8637","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-pieter-arntz","tag-security-certificates","tag-security-world","tag-technology","tag-trusted-root","tag-unable-to-connect-to-the-service","tag-untrusted","tag-wdfload"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8637"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8637\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}