sb-as logo
Story image

Illicit code signing certificates more valuable than handguns

04 Nov 2017

Venafi has released its findings of a six month investigation into the lucrative sale of digital code signing certificates on the dark web.

Conducted on behalf of Venafi by the Cyber Security Research Institute (CSRI), the study delved into code signing certificates readily available for purchase on the dark web that were selling for up to $1,200 – this makes them more expensive than counterfeit US passports, stolen credit cards and even handguns.

So what are code signing certificates specifically used for? Venafi says they can verify the authenticity and integrity of computer applications and software, making up a vital element of Internet and enterprise security.

Cybercriminals have been exploiting compromised code signing certificates to install malware on enterprise network and consumer devices in a lucrative market.

“We’ve known for a number of years that cyber criminals actively seek code signing certificates to distribute malware through computers,” says Peter Warren, chairman of the CSRI.

“The proof that there is now a significant criminal market for certificates throws our whole authentication system for the internet into doubt and points to an urgent need for the deployment of technology systems to counter the misuse of digital certificates.”

Chief security strategist at Venafi, Kevin Bocek says their research proves that code signing certificates are lucrative targets for cyber criminals.

“With stolen code signing certificates, it’s nearly impossible for organizations to detect malicious software. Any cyber criminal can use them to make malware, ransomware, and even kinetic attacks trusted and effective,” says Bocek.

“In addition, code signing certificates can be sold many times over before their value begins to diminish, making them huge money makers for hackers and dark web merchants. All of this is fuelling the demand for stolen code signing certificates.”

Warren says the size of the market is immense.

“Although our research uncovered a thriving trade in code signing certificates, we were only able to scratch the surface of this market,” says Warren.

“In an ironic twist, our researchers were often limited from delving further as dark web traders didn’t trust them. We suspect that TLS, VPN, and SSH key and certificate trading is also rife, alongside the trade in code signing certificates we uncovered.”

Story image
Zoom to begin rolling out end-to-end encryption
Available starting from next week, it represents the first phase out of four of the company’s greater E2EE offering, which was announced in May following backlash that the company was lax on its security and privacy.More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Report reveals relationship between boardroom and cybersecurity investments
“While boards are definitely listening and stepping up with increased budget for cybersecurity, they tend to view any investment as a cost rather than adding business value."More
Story image
Report: Power utilities increasingly at risk of devastating cyber-attacks
“Utilities’ existing systems are becoming increasingly connected through sensors and networks, and, due to their dispersed nature, are even more difficult to control.”More
Story image
Gartner names ThreatQuotient a representative vendor for SOAR
The company is listed in Gartner’s 2020 Market Guide for Security Orchestration, Automation and Response Solutions.More
Story image
Acronis expands global data centre network, including new facilities in NZ
The expansion ensures that the full range of Acronis Cyber Protection Solutions will be available to partners and organisations around the world.More