Blog

Malware Created Using Stolen Legitimate Security Certificate From D-Link

Jul 20, 2018 | Blog

Researchers from the digital security firm ESET have recently spotted a new malware campaign with a nasty twist.  It was created using a legitimate security certificate stolen from D-Link.

The malware appears to be the work of an Advanced Persistent Threat group known as BlackTech, which primarily targets high profile users and firms in Asia, with a

particular emphasis on Japan, Hong Kong and Taiwan.

BlackTech is responsible for two different malware families, PLEAD and the DRIGO exfiltration tool, both of which have been found to be using the stolen certificate.  ESET has also found the compromised certificate in the source code of a password stealer designed to scrape passwords from Google Chrome, Internet Explorer, Mozilla’s Firefox, and Microsoft Outlook.

ESET reported their findings to D-Link, and company officials opened a formal investigation into the matter. They ultimately discovered not one, but two compromised certificates, both of which were revoked immediately.

Even so, this latest discovery underscores one of the dangers of our current global security architecture.  Any central point is a source of weakness.  In this case, certificates are issued by a central body to provide a layer of trust.  Software developers use certificates to demonstrate that they are legitimate pieces of code.

That system works well, right up until the point where a hacker manages to steal one of the “trusted” certificates. Then, the weakness of the security paradigm is revealed.

This is just one of many areas of global network security that needs a top-to-bottom rethink and overhaul.  The old methods of securing our vast oceans of data just aren’t working any more.  Until something is done to change the game in the favor of security personnel, the hackers are going to have an increasingly easier time breaking in.

As ever, vigilance, however imperfect, is the best defense.

FBI Program Tasked with Infrastructure Security Compromised

FBI Program Tasked with Infrastructure Security Compromised

The FBI program tasked with ensuring critical infrastructure security has been compromised by hackers, who now offer access to the program's data on the dark web. The breach was initially disclosed by Brian Krebs of Krebs on Security, who claims that the data was for...

Streamline Your Business with the Latest Smart Home Technology

Streamline Your Business with the Latest Smart Home Technology

Are you a business owner looking to get the most out of your Google smart home devices? If so, you're in luck! Google has enabled its Nest products and Android OS with the initial rollout of the Matter smart home standard. This means that businesses now have the...

Data Breach at Sequoia One Exposes Sensitive Customer Information

Data Breach at Sequoia One Exposes Sensitive Customer Information

What do you do when your most personal information has been compromised? This is likely the question that customers of Sequoia One asked themselves earlier this month as they were informed that the company had been hacked. Sequoia One specializes in the management of...

Cisco Reports Critical IP Phone Vulnerability

Cisco Reports Critical IP Phone Vulnerability

As a business owner, it's important to stay informed about potential vulnerabilities that could impact your organization. Recently, Cisco reported a critical vulnerability, tracked as CVE-2022-20968, affecting its IP Phone 7800 and 8800 Series. This new vulnerability...

Google Chrome Releases Two New Features

Google Chrome Releases Two New Features

Google Chrome is one of the more commonly used web browsers. Over the years, though, Chrome has gained a reputation for utilizing a large portion of a computer's memory. This can be a problem if you're running other resource-intensive tasks and don't want to slow...

Get a Free Consultation

 

Fill out the form below to receive a free consultation and learn how we can make your technology worry-free!

 

Contact Information

  • 39301 Badger Street, Suite 500
    Palm Desert, CA 9221
  • (760) 333-8523
  • info@icn.tech