- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
IDG News Service - Security companies have recently identified multiple malware threats that use stolen digital certificates to sign their components in an attempt to avoid detection and bypass Windows defenses.
When it was discovered in 2010, the Stuxnet industrial sabotage worm surprised the security industry with its use of rootkit components that were digitally signed with certificates stolen from semiconductor manufacturers Realtek and JMicron.
Security experts predicted at the time that other malware creators would adopt the technique in the future in order to bypass the driver signature enforcement in 64-bit versions of Windows Vista and 7. Given recent developments it seems that they were right.
A backdoor discovered by Symantec in December installed a rootkit driver signed with a digital certificate stolen from an undisclosed company. The certificate was revoked by VeriSign at the owner's request 9 days later.
However, the time window available for the malware to remain undetected was larger than that, because Windows operating systems rarely check certificate revocation lists (CRL), or don't check them at all, Symantec principal software engineer Mircea Ciubotariu said in a blog post earlier today.
However, even if Windows would check such lists regularly, it wouldn't make much of a difference for malware that has already been signed with the revoked certificates, because blocking such files is impractical, said Costin Raiu, Kaspersky Lab's director of global research and analysis.
Raiu gave the stolen Realtek certificate used in Stuxnet as an example. "If Microsoft were to block the loading of all known files signed with that certificate, probably millions of users of RealTek hardware from around the world would find their motherboards, network cards, etc. inoperable," he said. "Therefore, Microsoft cannot block the execution or loading of files signed with stolen certificates."
A different malware component identified by Kaspersky Lab researchers during the last few days was signed with a certificate stolen from a Swiss company called Conpavi AG. "The company is known to work with Swiss government agencies such as municipalities and cantons," said Kaspersky Lab expert Vyacheslav Zakorzhevsky in a blog post.
The threat is detected as Trojan-Dropper.Win32/Win64.Mediyes and is part of a click fraud scheme. However, the signed component is not a driver, but the actual malware installer, also known as the dropper.
Malware authors are interested in signing installers and not just the drivers, because some antivirus solutions assume that digitally signed files are legitimate and don't scan them, said Bogdan Botezatu, a senior e-threat analyst at antivirus vendor BitDefender.
"Additionally, signed modules are more likely to be included in whitelisting collections meaning, the chance of them being fully analyzed is lower and they remain undetected for longer period of times," Raiu said.
Another non-driver malware component signed with a stolen digital certificate was recently identified by security researchers from AlienVault as part of an attack against Tibetan activist organizations.