Hackers steal Google security certificate, could target Gmail users
Domain certificate could sign fraudulent websites, warn antivirus vendors
By Gregg Keizer | Computerworld US | Published: 10:36, 30 August 2011
Hackers have obtained a digital certificate good for any Google website from a Dutch certificate provider, a security researcher has said.
Details of the certificate were posted on Pastebin last Saturday. Pastebin.com is a public site where developers, including hackers, often post source code samples.
According to Schouwenberg, the SSL (secure socket layer) certificate is valid, and was issued by DigiNotar, a Dutch certificate authority, or CA. DigiNotar was acquired earlier this year by Vasco, which bills itself on its site as "a world leader in strong authentication." Vasco did not reply to a request for comment.
Related Articles on Techworld
Security researcher and Tor developer Jacob Applebaum confirmed that the certificate was valid, as did noted SSL researcher Moxie Marlinspike on Twitter. "Yep, just verified the signature, that pastebin *.google.com certificate is real," said Marlinspike.
Because the certificate is valid, a browser would not display a warning message if its user went to a website signed with the certificate.
Man in the middle
Criminals could use the certificate to conduct "man-in-the-middle" attacks targeting users of Gmail, Google's search engine or any other service operated by the company.
"This is a wildcard for any of the Google domains," said Roel Schouwenberg, senior malware researcher with Kaspersky Lab. "[Attackers] could poison DNS, present their site with the fake cert and bingo, they have the user's credentials," said Andrew Storms, director of security operations at nCircle Security.
Man-in-the-middle attacks could also be launched via spam messages with links leading to a site posing as, say, the real Gmail. If recipients surfed to that link, their account login username and password could be hijacked.
It's unclear whether the certificate was obtained because of a lack of oversight by DigiNotar or through a breach of the company's certificate issuing website. Schouwenberg urged the company to provide more information as soon as possible.
"Given their ties to the government and financial sectors it's extremely important we find out the scope of the breach as quickly as possible," Schouwenberg said.
The situation is reminiscent of a breach last March, when a hacker obtained certificates for some of the web's biggest sites, including Google and Gmail, Microsoft, Skype and Yahoo. Then, Comodo said that nine certificates had been fraudulently issued after attackers used an account assigned to a company partner in southern Europe.
Nation state involvement
Initially, Comodo argued that Iran's government may have been involved in the theft. Days later, however, a solo Iranian hacker claimed responsibility for stealing the SSL certificates.
Today, Kaspersky's Schouwenberg said "nation state involvement is the most plausible explanation" for the acquisition of the DigiNotar-issued certificate.
"For one [thing], there's the type of information being looked for from Google users," said Schouwenberg. "This hints towards an intelligence operation rather than anything else. Secondly, this type of attack only works when the attacker has some control over the network, but not over the actual machine."
Others were more skeptical because of the claim that a single hacker pulled off the Comodo heist.
"I think it might still be a stretch to attribute this to the Iranian government," said Marlinspike on Twitter. "We all know how that went last time."
Certificate still valid
The google.com certificate has not yet been revoked by DigiNotar, the first step to blocking its use, even though it was issued July 10. Last March, browser makers rushed out updates that added the stolen Comodo certificates to their applications' blacklists.
Today, Storms said he expected Google to quickly update Chrome, and that Microsoft, Mozilla and other would do the same some time later. "I suspect that if asked [Microsoft and Mozilla] will also issue updates, as there is already a precedent," said Storms.
Google did not reply to a request for comment on the rogue certificate.