Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Microsoft Security The Internet News

Microsoft Certificate Was Used To Sign Flame Malware 194

wiredmikey writes "Microsoft disclosed that 'unauthorized digital certificates derived from a Microsoft Certificate Authority' were used to sign components of the recently discovered Flame malware. 'We have discovered through our analysis that some components of the malware have been signed by certificates that allow software to appear as if it was produced by Microsoft,' Microsoft Security Response Center's Jonathan Ness wrote in a blog post. Microsoft is also warning that the same techniques could be leveraged by less sophisticated attackers to conduct more widespread attacks. In response to the discovery, Microsoft released a security advisory detailing steps that organizations should take in order block software signed by the unauthorized certificates, and also released an update to automatically protect customers. Also as part of its response effort, Microsoft said its Terminal Server Licensing Service no longer issues certificates that allow code to be signed."
This discussion has been archived. No new comments can be posted.

Microsoft Certificate Was Used To Sign Flame Malware

Comments Filter:
  • by danbuter ( 2019760 ) on Monday June 04, 2012 @09:40AM (#40208053)
    I kind of thought Microsoft would make damn sure someone else couldn't duplicate their signatures (barring an employee or a government doing it).
  • by Anonymous Coward on Monday June 04, 2012 @09:41AM (#40208055)

    Proving once and for all that Microsoft's control of the bootloader key that is used everywhere will make all future computers more secure!

  • by Anonymous Coward on Monday June 04, 2012 @09:46AM (#40208109)

    I think it was an SHS exploit or something in the Windows Kernel. Steve Gibson stepped through the Kernel and concluded that this vulnerability was an intentionally placed backdoor, perhaps by a Microsoft employee. It's in one of his earlier podcasts. Lots of people thought maybe he was crazy at the time, but in retrospect ... maybe not so much.

    • by JustNiz ( 692889 ) on Monday June 04, 2012 @12:15PM (#40209771)

      Nice to know that even now, after Microsoft have been bitten so many times, it still hasn't occurred to them to do security auditing of at least the kernel API before they release it as a global product.
      And this is the company and product most businesses choose to trust? wow. and will be the authority for the trustable bootloader key.. again, wow.

    • by ChumpusRex2003 ( 726306 ) on Monday June 04, 2012 @12:27PM (#40209937)

      I don't think Gibson found a kernel backdoor.

      He did should very loudly about an intentional backdoor in the windows metafile image handler, which would start executing native code when a callback command was included in the script. He made a large number of spurious arguments as to why this was clearly intentional, as the vuln could only be triggered in very exceptional circumstances.

      He was completely wrong about almost everything he said. The vuln was trivial to trigger, except when it was the last instruction in the script (which was the only way Gibson was testing). From the fact that he had great difficulty triggering it, requiring multiple parameters to be set to nonsense values, he concluded that this was clearly a deliberate backdoor.

      It later came out from a number of MS insiders (incl. Mark Russinovich) that metafiles were a feature of Win 3, and were intended to be fully-trusted OS components (for rapid image drawing, and therefore had privileged access to a variety of internal system calls - notably the ability to set callbacks). The functionality was greatly increased in Win95 and later, with the original x86 hand-written assembly being ported directly, rather than rewritten. In the mists of time, the assumption of full-trust got lost.

    • by trifish ( 826353 ) on Monday June 04, 2012 @01:29PM (#40210745)

      Since when is sheer unsourced FUD posted by Anonymous Coward starting with "I think that" moderated +5?

  • by InvisibleClergy ( 1430277 ) on Monday June 04, 2012 @09:56AM (#40208209)

    Attackers broke an old form of security which has been relatively trivially patched. This is actually good for Microsoft, because (ideally) now they will review all of their old authorized keys and determine which would be easier to generate. So it's not like Microsoft included their Private Key in plaintext in some code somewhere, or anything like that.

  • UEFI (Score:5, Insightful)

    by Anonymous Coward on Monday June 04, 2012 @10:01AM (#40208263)

    And this is how they plan to monopolize Secure Boot (UEFI) and get rid of Linux? why should I trust that ONE KEY that microsoft plans to install on all motherboards?

    JP

    • Re:UEFI (Score:2, Informative)

      by KingMotley ( 944240 ) on Monday June 04, 2012 @10:39AM (#40208691) Journal

      First of all the Secure Boot in UEFI wasn't mandated by Microsoft, it a feature they they have decided to implement. A feature any OS is free to implement, including linux.
      Secondly, motherboard manufacturers are able to add (or pre-add) any key (or none at all) if they choose.
      Thirdly, there is nothing keeping users from being able to install their own key (or additional keys) through the UEFI boot process, assuming the UEFI manufacturer provides one.

      Really, stop spreading your FUD.

      • Re:UEFI (Score:5, Informative)

        by betterunixthanunix ( 980855 ) on Monday June 04, 2012 @10:58AM (#40208899)

        First of all the Secure Boot in UEFI wasn't mandated by Microsoft

        Except when it comes to Windows 8 on ARM systems. Then Microsoft does mandate secure boot.

        A feature any OS is free to implement, including linux.

        1. Linux is not an operating system, it is a kernel.
        2. What difference does it make if other OSes support secure boot, if you cannot install those OSes as a result of secure boot being used?

        Secondly, motherboard manufacturers are able to add (or pre-add) any key (or none at all) if they choose.

        This is a cop out; unless there is a simple way for users to install their own keys, this is something that will further restrict how people can use their computers. You can jailbreak your iPad if you want, but the majority of people have trouble doing so.

        Thirdly, there is nothing keeping users from being able to install their own key (or additional keys) through the UEFI boot process, assuming the UEFI manufacturer provides one.

        ...which is something Microsoft pressures them not to do on ARM devices:

        https://www.softwarefreedom.org/blog/2012/jan/12/microsoft-confirms-UEFI-fears-locks-down-ARM/ [softwarefreedom.org]

        Really, stop spreading your FUD.

        What FUD? We said years ago that iPad style lock-down is coming to desktops and laptops; now we have moved a step closer. There is a lot of money to be made from attacking computer users' freedom, and now that Apple has pulled in billions of dollars doing so, everyone else wants to join the party.

        • Re:UEFI (Score:4, Informative)

          by a90Tj2P7 ( 1533853 ) on Monday June 04, 2012 @11:24AM (#40209205)

          This is a cop out; unless there is a simple way for users to install their own keys, this is something that will further restrict how people can use their computers.

          There is. UEFI isn't new, nor is secure boot. The only thing new is MS wanting to make it . There's a process for adding keys. Or the vendor can just pay $99 to Verisign like Fedora's doing. Even if you think that isn't "simple" enough, the feature can just be disabled on x86 machines.

          • by a90Tj2P7 ( 1533853 ) on Monday June 04, 2012 @11:28AM (#40209245)

            The only thing new is MS wanting to make it a prerequisite for Win 8.*

          • Re:UEFI (Score:5, Insightful)

            by betterunixthanunix ( 980855 ) on Monday June 04, 2012 @11:39AM (#40209353)

            the vendor can just pay $99

            The fact that this is phrased in terms of "vendors" should indicate that this is an attack on user freedom. A fee to install your signing key creates obstacles for anyone who wants to fork a GNU/Linux distribution (happens all the time), anyone who wants to create their own distribution, and anyone who wants to try "Linux from Scratch" (and I know of a few people who have done so). It also creates an obstacle for anyone who wants to write their own kernel or OS; if Linus Torvalds had to pay $99, the Linux kernel itself may never have been created.

            Even if you think that isn't "simple" enough

            The fact that money is involved makes it a major barrier, and counts very strongly against the process being "simple" (it requires a payment to be processed, a third party to the new key, etc. -- you cannot even test a system without the fee; compare with TLS, where you can generate a usable test certificate without paying anyone).

            the feature can just be disabled on x86 machines.

            Only if the motherboard manufacturer allows it, and this is not allowed on ARM machines that will run Windows 8. Considering the inroads ARM has made into personal computing, I do not think it is unfair to say that the decisions made today about ARM computers will shape the reality of personal computing over the next decade. We are already seeing this happening; app stores are the norm, people are talking about trendy apps, etc.

          • by ThatsNotPudding ( 1045640 ) on Monday June 04, 2012 @01:33PM (#40210797)

            Even if you think that isn't "simple" enough, the feature can just be disabled on x86 machines.

            Until NSA/MS Black Ops releases the exploits targeting non-secure boot machines...

        • by KingMotley ( 944240 ) on Monday June 04, 2012 @12:10PM (#40209713) Journal

          Linux is not an operating system, it is a kernel.

          Actually, it is an operating system. It by itself is just a kernel, granted, but an operating system kernel is itself an operating system. I realize you were just trying to point out a triviality, but you are incorrect in your terminology. You may not use the term in that fashion, and you may prefer to call linux the kernel where as {flavor of the month} as the operating system so that you can try and draw a line to show the difference to people that aren't familiar with it, but that doesn't make it incorrect to label it as such. The linux kernel meets every requirement necessary to be called an operating system itself. If you can find a definition of Operating System by ANY relevant source, please provide it, because it meets every definition I've ever heard of.

          What difference does it make if other OSes support secure boot, if you cannot install those OSes as a result of secure boot being used?

          Then disable secure boot.For example, hold down shift while you turn on the computer to enter the UEFI. Select the "Security" section, then uncheck "secure boot enabled". Click OK. Reboot. Boy, that was hard.

          This is a cop out; unless there is a simple way for users to install their own keys, this is something that will further restrict how people can use their computers. You can jailbreak your iPad if you want, but the majority of people have trouble doing so.
          There is a simple way for users to install their own keys, or disable secure boot entirely if they want. And selecting a menu option is not quite the same thing as download this program from this site, connect your iDevice, sideband load this, hit these 20 keys while you reboot, then make sure you check the version of iOS you are running because this backdoor doesn't work in the versions x,y,z.

          ...which is something Microsoft pressures them not to do on ARM devices:

          https://www.softwarefreedom.org/blog/2012/jan/12/microsoft-confirms-UEFI-fears-locks-down-ARM/ [softwarefreedom.org]

          And you can't load an alternate OS on my refrigerator, my drier either, or my TV. While it's technically possible I suppose, people aren't demanding it, nor would I suspect a large amount of users want to buy an ARM based tablet with windows 8 and want to dual boot to another OS. There are plenty of devices out there that can run the OS of your choice.

          • by betterunixthanunix ( 980855 ) on Monday June 04, 2012 @12:52PM (#40210269)

            Then disable secure boot.For example, hold down shift while you turn on the computer to enter the UEFI. Select the "Security" section, then uncheck "secure boot enabled". Click OK. Reboot. Boy, that was hard.

            Except that you are not allowed to do so on ARM systems that run Windows 8, as per Microsoft's demands.

      • Re:UEFI (Score:4, Interesting)

        by MickyTheIdiot ( 1032226 ) on Monday June 04, 2012 @11:14AM (#40209101) Homepage Journal

        But is Linux only able to join the party is it plays in the game Microsoft created? Do you have to be a multi-million dollar company to play? Can I write my own OS if I wanted to and have it boot "securely" on hardware that I own.

        None of this seems answered right now. I know that the idiots in Washington DC think you have to be a company to make software, but when you implement that into the hardware it's total bullshit.

  • by darkob ( 634931 ) on Monday June 04, 2012 @10:26AM (#40208545)
    I wonder how long will it take for the government(s) to decide they in fact own every computer (or at least it's processing capabilities) and issue some sort of mandatory backdoor. As it seems antivirus companies might be first compelled to "go along" with the new paradigm, by probably "not detecting" presence of some (government?!) software (that we oldfashionedly still call "malware", whereas these pieces of code are highly focused towards very specific target, so majority of users/comp. owners should have no problems whatsoever with the sinister part of said software). Indeed, grim future may even be "you should let that piece of software alone, if you have nothing to hide". Weather or not this story has anything to do with the _NSAKEY.
  • by Edzilla2000 ( 1261030 ) on Monday June 04, 2012 @11:11AM (#40209063)

    Considering that microsoft sold the possibility to sign ssl certificates for any domain to the late Tunisian government, why wouldn't they sell the same thing to the makers of that virus, if it really comes from a government?

    source: http://arabcrunch.com/2011/09/wikileaks-microsoft-accused-in-helping-bin-ali-monitor-tunisians-corruption-stifling-open-source.html [arabcrunch.com]

    • by 0ld_d0g ( 923931 ) on Monday June 04, 2012 @02:26PM (#40211515)

      I think you misunderstood the article. They did not give the government a possibility to "sign ssl certificates for any domain" - whatever that means. (private keys are used to sign things, and public certificates are issued to ensure that the private key used earlier was valid - as long as you trust the CA). Microsoft has no such power. But IE, like all current browsers maintains a simple list of trust worthy CAs and they allowed the Tunisian government's CA to be included in the list of 'safe' CAs. This by itself is not a problem - its only a problem because the government is repressive and could use this power to do much evil. This means that in theory the Tunisian government could conduct man in the middle attacks and the end user would not notice (only if using IE). I believe they were safe on other browsers. Ofcource but they could repackage firefox with their own CA and do the same to firefox users.

  • Really? (Score:5, Interesting)

    by Corson ( 746347 ) on Monday June 04, 2012 @11:41AM (#40209367)
    Flamer is out in the wild since cca. 2007, with a MS signed certificate, and the only IT security organization that decides to bring it to public attention is a Russian company, and the first removal tool is from a Romanian company. Isn't this a bit strange? Isn't it more likely that this NA-designed spyware targetting the Middle East was released with the tacit agreement of Western security companies and it only became known because the Russians, for some reason, decided they would not play the game? Microsoft being unaware for thw last few years that hundreds of computers are infected with a 20 MB spyware pack bearing a security certifice of their own? Come on...
  • by fa2k ( 881632 ) <pmbjornstad@gmaPERIODil.com minus punct> on Monday June 04, 2012 @11:57AM (#40209545)
    It has recently become obvious that spy agencies can get any keys/certificates they need. An obvious way to spread spy software would be to send a poisoned system update, or an update for Adobe, etc. In the end, we have to trust the people who provide software systems, or write everything from scratch (and possibly build the hardware). Is there a usable system that limits the extent to which software creators can take control? Would be nice if there was a system that wasn't constantly tied to an update repository, and the code was reviewed, yet it was still usable.
  • Today's Lesson (Score:5, Insightful)

    by Adrian Lopez ( 2615 ) on Monday June 04, 2012 @12:06PM (#40209661) Homepage

    So... what did we learn today?

    1. Signed code is not safe code.
    2. An insecure operating system that only runs signed code is still an insecure operating system.

  • by WaffleMonster ( 969671 ) on Monday June 04, 2012 @12:45PM (#40210199)

    Why are there two certificates with the exact same label? It takes a special kind of idiot.

    "Microsoft Enforced Licensing Intermediate PCA"

    Why does a certificate valid from 2002 to 2010 matter in 2012.. oh yea thats right code signing certificates are based on the timestamp of the code and so when you compromise a signing cert 100 years from now and take that impossibly difficult extra step of forging a valid timestamp it will still be valid. All code signing certs should have an indefinate expiration because effectivly thats what they really are. Any other label is grossly misleading.

    The security week and MS article talks about forging keys using what I assume are insecure for signature algorithms.. I assume they mean MD5..but hey look at this:

    The signature algorithm for Microsoft Enforced Licensing Registration Authority CA (SHA1) is sha1 this is currently what EVERYONE is using. Was this cert also compromised in the same way? Why is it here?

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...