Skip Links

Nearly 300,000 Iranian IP addresses likely compromised

Security firm Fox-IT said over 99 percent of requests for using a rogue certificate came from Iran

By , IDG News Service
September 06, 2011 11:46 AM ET

IDG News Service - Close to 300,000 unique IP addresses from Iran requested access to using a rogue certificate issued by Dutch digital certificate authority DigiNotar, according to an interim report by security firm, Fox-IT, released on Monday.

The rogue certificate, issued on July 10 by DigiNotar, was finally revoked on Aug. 29.

"Around 300.000 unique requesting IPs to have been identified," Fox-IT said in the report. On Aug. 4 the number of requests rose quickly until the certificate was revoked on Aug. 29. Of these IP (Internet Protocol) addresses, more than 99 percent originated from Iran.

The list of IP addresses will be handed over to Google who can inform users that their e-mail might have been intercepted during this period, Fox-IT said.

Not only the e-mail itself but also a login cookie could have been intercepted, it added. Using this cookie the hacker is able to log in directly to the Gmail mailbox of the user and other services from Google.

"The login cookie stays valid for a longer period," Fox-IT said. It would be wise for all users in Iran to at least logout and login, but even better change passwords, it added.

A sample of the IP addresses outside of Iran during the period were mainly Tor-exit nodes, proxies and other VPN (virtual private network) servers, and almost no direct subscribers, according to the report which analyzed OCSP (Online Certificate Status Protocol) request logs.

Current browsers perform an OCSP check as soon as the browser connects to an SSL (secure sockets layer) website protected through the https (hypertext transfer protocol secure) protocol.

Tor is a distributed anonymous network used by people to prevent being tracked by websites or to connect to instant messaging services and other services when these are blocked by their local Internet service providers.

A total of 531 digital certificates were issued for domains that included, the CIA, and Israel's Mossad,

The list of domains and the fact that 99 percent of the users are in Iran suggest that the objective of the hackers was to intercept private communications in Iran, Fox-IT said.

Google said on Aug. 29 that it received reports of "attempted SSL man-in-the-middle (MITM) attacks" against Google users, whereby someone tried to get between them and encrypted Google services. The people affected were primarily located in Iran.

The attacker used a fraudulent SSL certificate issued by DigiNotar which has since revoked it, Google said in a blog post.

Trend Micro, another security firm, said on Monday that domain was mostly loaded by Dutch and Iranian Internet users until Aug. 30. Domain name is used by Internet browsers to check the authenticity of SSL certificates that are issued by DigiNotar.

DigiNotar is a small Dutch certification authority with customers mainly in the Netherlands. "We, therefore, expect this domain name to be mostly requested by Dutch Internet users and perhaps a handful of users from other countries but certainly not by a lot of Iranians," Trend Micro's senior threat researcher, Feike Hacquebord, said in a blog post.

Our Commenting Policies
Latest News
rssRss Feed
View more Latest News