SSL Certification Assault Uses Comodo’s Name

Security researchers warn that cyber criminals fraudulently acquired SSL (Secure Sockets Layer) certificates for 5 widely used Internet sites as a stage in one larger assault that is designed for distributing malware or seizing sensitive data. EWeek.com published this in news on March 23, 2011.

By purporting to be an alliance of Comodo Security, the cyber criminals succeeded in asking for copycat digital certificates in connection with 7 web-domains for well-known Internet sites that comprised Google, Skype, Microsoft and Yahoo among others, Comodo Security stated. And while the company revoked the certificates instantly it didn't notice any instance of the same being utilized.

Explain the security researchers that the purpose of the false SSL numbers is to use popular websites for redirecting Web-surfers onto bogus sites that potentially make the surfers divulge their confidential data or unwittingly download malware.

Reportedly, an attacker detected to use an Internet Protocol address in Iran, managed to utilize the deceptively acquired account details for making their Internet Protocol addresses appear authentic as well as imitating particular domain servers and websites, with an SSL certificate included in connection with a spare update server for catering to Web-browsers.

States vice president of managed identity and SSL, Brian Trzupek of Trustwave, getting one valid certificate to authenticate any Web-domain that the user can't control merely stands for the attack as a minor part of it. Actually, no sooner is the certificate acquired, the attacker would be manipulating DNS for diverting traffic onto the falsely certified fake website, Trzupek explains. SearchSecurity.com published this in news on March 23, 2011.

The vice president further states that while the current assault impacts merely Comodo sparing other certificate issuing agencies, it could mean larger adversities for all Internet browsers, which rely on Comodo. EWeek.com reported this in news on March 23, 2011.

Nevertheless, it is now important for Web-surfers to ensure that their browsers are modern and wholly up to date. Moreover, for keeping secured from the assaults, they must make sure their security checks namely Online Certificate Status Protocol (OCSP) or Certificate Revocation List (CRL) aren't disabled within their browsers.

Related article: SoCal Computer Hack Traces to Watsonville

» SPAMfighter News - 01-04-2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next