Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security News

Adobe Revoking Code Signing Certificate Used To Sign Malware 39

wiredmikey writes "Adobe said Thursday it will be revoking a code signing certificate next week after discovering two pieces of malware that had been digitally signed with Adobe's credentials. Two malicious utilities, pwdump7 v7.1 and myGeeksmail.dll, both came from the same source and were signed with valid Adobe digital certificates, Adobe's Brad Arkin said. Adobe plans to revoke the impacted certificate on Oct. 4. After initial investigation, the company identified a compromised build server which had been used to access the code signing infrastructure, Brad Arkin wrote in a blog post. The build server did not have rights to any public key infrastructure functions other than the ability to issue requests to the signing service and did not have access to any Adobe products such as Flash Player, Adobe Reader, Shockwave Player, or Adobe AIR, Arkin said. According to Adobe, most customers won't notice anything out of the ordinary during the certificate revocation process, but some IT administrators may have to take some actions in response."
This discussion has been archived. No new comments can be posted.

Adobe Revoking Code Signing Certificate Used To Sign Malware

Comments Filter:
  • by Anonymous Coward on Thursday September 27, 2012 @08:23PM (#41484055)

    " According to Adobe, most customers won't notice anything out of the ordinary during the certificate revocation process, but some IT administrators may have to take some actions in response."

    Considering the fact that the malware associated with the use misuse of Adobe certs is either .exe or .dll binaries my guess is that the admins that will be most plagued by users not having access to some things all of a sudden will be mostly administering small Windows servers.
    I would guess that a large number of small businesses that run some form of win server will have kittens if they have implemented the lax user security policies that most MS certified pimple faced admins use by default.

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...