Code signing certificates misused

B2B Cyber ​​Security ShortNews

Share post

On February 15, Australian antivirus manufacturer Emsisoft announced that a security incident had occurred in which a fake code-signing certificate was used to disguise a targeted attack against an organization.

The attacker's goal was to trick the affected organization into allowing an application that the threat actor had installed and intended to use by making its detection appear as false positives. The attack failed, the antivirus software detected and blocked it. The method used to gain initial access is still unclear, but most likely either a brute force attack on RDP or the use of compromised credentials was performed.

spoofing

Spoofing has long been a problem, but more in the context of website spoofing and phishing. It is therefore interesting that the same approach, namely changing a letter, is also applied to code-signing machine identities. The fact that threat actors use fake code-signing certificates to impersonate companies is well known. Threat actors know that trusted access to an organization's system via fake machine identities is something of a digital front door. In this case, the fake identity was detected and flagged, but could easily have been overlooked.

It's harder than ever for security departments to make decisions about what can and cannot be trusted, especially given the speed of software development environments. As the number of machine identities in an organization grows exponentially, they need a control plane to automate the management of machine identities. This provides IT security professionals with the visibility, consistency and reliability they need to effectively manage their machine identities and prevent malicious actors from sneaking in.

More at Venafi.com

 


About Venafi

Venafi is the cybersecurity leader in identity management for machines. From on-premises to the cloud, Venafi solutions manage and protect identities for all types of machines - from physical and IoT devices to software applications, APIs and containers. Venafi provides global visibility, lifecycle automation, and actionable intelligence for all types of machine identities and their associated security and reliability risks.

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more