Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Bit9 customers attacked after firm fails to protect its own digital certificate

Three customers discover malware

Article comments

Security firm Bit9 has admitted hackers were able to install malware on the networks of some of its customers after hijacking the company’s digital code-signing certificate via unprotected internal servers.

For a vendor that sells whitelisting software that OKs each application allowed to run, this is about as unpleasant an admission as it is possible to imagine.

The attacker gained “temporary” use of the company’s trusted certificate – i.e. broke in and stole the encrypted key - using it to sign malware that was distributed to three companies, Bit9 said in a blog post.

According to security expert Brian Krebs who first reported the issue, the issue only came to light because customers started turning up malware that had been signed by the vendor’s certificate, a realisation that must have been terrifying for all concerned.

“Due to an operational oversight within Bit9, we failed to install our own product on a handful of computers within our network,” read an official Bit9 post.

The number of victims represented only a tiny proportion of the company’s sizable customer base, which includes a clutch of large, well-known US organisations.

“We simply did not follow the best practices we recommend to our customers by making certain our product was on all physical and virtual machines within Bit9,” continued the post in a bleak understatement of the obvious.

In a small but important mercy, the flaw had at least been in the security of the certificate servers, rather than the software itself, the firm said.

As well as revoking the rogue certificate, Bit9 had applied the necessary security to the servers holding new keys and as an added protection planned to patch its software to detect the malware associated with the certificate compromise.

“The fact that this happened - even to us - shows that the threat from malicious actors is very real, extremely sophisticated, and that all of us must be vigilant.  We are confident that the steps we have taken will address this incident while preventing a similar issue from occurring again,” Bit9 said.

The irony of whitelisting being compromised so embarrassingly by the back door at a time when traditional antivirus protection is increasingly being rubbished for its inadequacy against targeted attacks wasn’t lost on others in the security community.

“When malicious software does get past the whitelisting application - and it eventually will, as witnessed by this incident - then it is the AV software that can tell you what the problem is," suggested Randy Abrams, research director of security testing outfit, NSS Labs.

"Whitelisting does not tell if software is benign, malicious, or even exploitable, it tells you that the application was approved. Mistakes happen and if you ditched 'Plan B' because of a slick sales pitch, you're going to pay the price," he said.

The targeting of stolen digital certificates of one ilk or another has become a major security worry in recent times.

The most disturbing example was a piece of malware called Flame (widely assumed to be a state-sponsored cyberweapon) that successfully impersonated one of Microsoft’s digital certificates in order to distribute itself under the cover of an official Windows Update.

In a different context there have been a series of compromises of the digital certificates used to guarantee Internet domains as genuine.


More from Techworld

More relevant IT news


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *