Hackers stole Google SSL certificate, Dutch firm admits

Chrome and Firefox face updates, Microsoft blacklists firm’s certs in Windows 7 and Vista, but not XP

Computerworld – The Dutch company that issued a rogue digital certificate for all Google Internet domains said today that its network had been hacked last month Microsoft 70-640 Training .”

Best Microsoft MCTS Training – Microsoft MCITP Certification
at Certkingdom.com

DigiNotar, a Dutch certificate authority (CA) that was acquired earlier this year by Chicago-based Vasco, said it was unaware of the breach for more than a week and had overlooked the in-the-wild Google certificate for over a month.

Multiple SSL (secure socket layer) certificates were stolen in the July hack, said DigiNotar.

“On July 19, 2011, DigiNotar detected an intrusion into its Certificate Authority (CA) infrastructure, which resulted in the fraudulent issuance of public key certificate requests for a number of domains, including Google.com,” the company said in a statement on Tuesday.

“At that time, an external security audit concluded that all fraudulently issued certificates were revoked. Recently, it was discovered that at least one fraudulent certificate had not been revoked at the time,” said DigiNotar, referring to the certificate valid for all Google properties.

The company did not provide any additional information about the intrusion, such as the origin of the attack or the number of certificates that had been issued to the intruders. DigiNotar has not replied to Computerworld’s questions.

Today, however, a DigiNotar spokesman told Jeremy Kirk of the IDG News Service — like Computerworld, part of IDG — that “several dozen” certificates had been generated by the hackers.

DigiNotar’s timeline shows that the company was unaware of the hack for over a week: The Google certificate was issued July 10, according to information posted to Pastebin.com last Saturday. DigiNotar did not revoke the Google certificate until Monday, Aug. 29.

Fraudulently-acquired certificates are dangerous because they can be used by criminals to conduct “man-in-the-middle” attacks targeting users of legitimate online services and websites. The fake Google certificate, for example, was used by attackers to target Iranian users of the Mountain View, Calif.-based search giant’s services, Google said late Monday.

The DigiNotar hack was the second breach of a certificate-issuing firm since March, when Comodo admitted that hackers had used an account assigned to a company partner in southern Europe.to acquire nine certificates for some of the Web’s biggest sites, including Google and Gmail, Microsoft, Skype and Yahoo Microsoft Free MCTS Training and MCTS Online Training.

Initially, Comodo argued that Iran’s government may have been involved in the theft. Days later, however, a solo Iranian hacker claimed responsibility for stealing the SSL certificates.

On Monday, Google pointed a finger at Iran in the DigiNotar hack, saying that attacks using the ill-gotten certificate had targeted Iranian users.

Over the past 24 hours, Google, Microsoft and Mozilla have taken steps to block the rogue certificate.

Google will update Chrome “very soon,” said a company spokesman today, to block all DigiNotar-issued certificates “while investigations continue.”