Enter Your Details to Register

Please enter your official e-mail ID. Kindly do not use a personal ID like GMail, Yahoo etc.,
Please do not enter +91 or 0.
Image CAPTCHA
Enter the characters (without spaces) shown in the image.

Enter Your Log-in Details

Digitally Signed Malware is Increasingly Prevalent, Researchers Say

Added 16th Mar 2012

Security companies have recently identified multiple malware threats that use stolen digital certificates to sign their components in an attempt to avoid detection and bypass Windows defenses.

When it was discovered in 2010, the Stuxnet industrial sabotage worm surprised the security industry with its use of rootkit components that were digitally signed with certificates stolen from semiconductor manufacturers Realtek and JMicron.

Security experts predicted at the time that other malware creators would adopt the technique in the future in order to bypass the driver signature enforcement in 64-bit versions of Windows Vista and 7. Given recent developments it seems that they were right.

A backdoor discovered by Symantec in December installed a rootkit driver signed with a digital certificate stolen from an undisclosed company. The certificate was revoked by VeriSign at the owner's request 9 days later.

However, the time window available for the malware to remain undetected was larger than that, because Windows operating systems rarely check certificate revocation lists (CRL), or don't check them at all, Symantec principal software engineer Mircea Ciubotariu said in a blog post earlier today.

However, even if Windows would check such lists regularly, it wouldn't make much of a difference for malware that has already been signed with the revoked certificates, because blocking such files is impractical, said Costin Raiu, Kaspersky Lab's director of global research and analysis.

Raiu gave the stolen Realtek certificate used in Stuxnet as an example. "If Microsoft were to block the loading of all known files signed with that certificate, probably millions of users of RealTek hardware from around the world would find their motherboards, network cards, etc. inoperable," he said. "Therefore, Microsoft cannot block the execution or loading of files signed with stolen certificates."

A different malware component identified by Kaspersky Lab researchers during the last few days was signed with a certificate stolen from a Swiss company called Conpavi AG. "The company is known to work with Swiss government agencies such as municipalities and cantons," said Kaspersky Lab expert Vyacheslav Zakorzhevsky in a blog post.

The threat is detected as Trojan-Dropper.Win32/Win64.Mediyes and is part of a click fraud scheme. However, the signed component is not a driver, but the actual malware installer, also known as the dropper.

Malware authors are interested in signing installers and not just the drivers, because some antivirus solutions assume that digitally signed files are legitimate and don't scan them, said Bogdan Botezatu, a senior e-threat analyst at antivirus vendor BitDefender. 

"Additionally, signed modules are more likely to be included in whitelisting collections meaning, the chance of them being fully analyzed is lower and they remain undetected for longer period of times," Raiu said.

Another non-driver malware component signed with a stolen digital certificate was recently identified by security researchers from AlienVault as part of an attack against Tibetan activist organizations.

"The malware being used in this attack is a variant of Gh0st RAT (remote access Trojan), a type of software that enables anything from stealing documents to turning on a victim's computer microphone," said Jaime Blasco, a security researcher at AlienVault, in a blog post on Tuesday. "Gh0st RAT was a primary tool used in the Nitro attacks last year and the variant we uncovered in these attacks seem to come from the same actors."

Both Kaspersky Lab and BitDefender have confirmed seeing a steady increase in the number of malware threats with digitally signed components during the last 24 months. Many use digital certificates bought with fake identities, but the use of stolen certificates is also common, Craiu and Botezatu said.

  • Fresh from $532.9M win, Smartflash sues Apple again

    Shortly after a jury in Texas awarded it US$532.9 million in damages in a patent dispute with Apple, patent company Smartflash has sued the iPhone maker again, this time to focus on newer Apple products.

  • John Lewis mail glitch leaves customers with £1.53 bill for marketing circular

    An unknown number of John Lewis and Waitrose customers have been asked to pay a £1.53 postage charge by the Royal Mail after a franking machine failed to correctly stamp letters sent out as part the firm's latest credit card marketing campaign.

  • Insurance firm Staysure fined £175,000 for 'unbelievable' credit card hack

    The ICO has handed online insurance firm Staysure.co.uk a stinging £175,000 fine after chaotic security practices allowed hackers to steal details of 100,000 credit card numbers from the firm's database, several thousand of which experienced fraud.

  • Social discovery app Vurb keeps your favorite apps in one place

    It's Friday night--time for you and your buddies to hammer out your plans for the evening. You know the drill: you start with a group text, then you launch Yelp to find a restaurant or bar nearby. Oh, there will be eight of you? Better make a reservation; switch to Open Table. Joe suggests you catch a movie first, so now you launch Fandango. And the app-switching cycle continues until your plan is finalized.

  • Pizicato lets starving musicians set up virtual tip jars

    The U.S. government is mulling radical changes to the current music-licensing framework, a cobweb of anachronistic regulations. Perhaps a better analogy still would be a noose, because this inequitable licensing regime is in many ways strangling music itself. It's depriving musicians of the financial oxygen they need to sustain their craft.

  • BBC makes it easier to find what you like on iPlayer with BBC Shuffle

    The recommendation engine suggests things you might enjoy watching based on a set of like and dislikes.

  • Firms offered up to £35,000 to find fintech solutions to five industry challenges

    Government-backed competition will offer firms the chance to work with Accenture, American Express, Experian and Lloyds Banking Group

  • Foxconn expects robots to take over more factory work

    The electronics industry may still be reliant on human workers to assemble products, but Apple supplier Foxconn Technology Group is hopeful that robots will take over more of the workload soon.

  • Ericsson seeks to block sales of Apple products in US, stepping up patent dispute

    Some Apple products may be banned from sale in the U.S. if Ericsson gets its way after filing a barrage of patent lawsuits.

  • Why Pebble Time, not Android Wear, is Apple Watch's biggest competition

    If you had told me last December that in the first part of 2015, a smartwatch would make headlines across the world, shatter sales records, and create a constant stream of refreshes, hashtags and bad puns, I would have naturally assumed you were talking about Apple Watch. For the past five months we've been anxiously awaiting the "early 2015" debut of Apple's first wearable, an entry so important it's basically put its Android Wear competitors on ice as buyers wait to see what Apple Watch can really do.

  • Toyota begins production of its first hydrogen fuel cell car

    Toyota this week began production of its first hydrogen fuel cell vehicle (FCV), the Mirai, which will have a starting price of $57,500.

  • The changing face of the datacentre

    Andrew Kirker is a man who knows the datacentre market better than almost anyone. As regional general manager datacentres for Schneider Electric, one of the world's largest manufacturers of datacentre infrastructure, he has his finger firmly on the pulse.

  • Cochlear refines digital roadmap

    Australian hearing implant company, Cochlear, is refining its digital roadmap with investments in enterprise content management (ECM) system across core lines of business.

  • Baker Tilly International deploys global Huddle cloud collaboration platform

    Huddle, the UK startup that raised £32 million in venture capital funding last December, is looking to take on businesses such as Box and Dropbox.

  • Survey: iPhone 6 powers an increase in enterprise adoption of iOS

    Apple's iOS mobile platform gained user share in security-conscious businesses late in 2014, taking it away from Google's Android platform, thanks to the introduction of the iPhone 6 smartphone, according to a survey of its enterprise customers by mobile security vendor Good Technology.

  • Bad with names? 2 Android apps try to help

    A few years ago, Evernote picked up a small contact-manager app called Hello (which was then retitled Evernote Hello). One of the main ideas behind the app was to help those of us who had trouble remembering names (a category I definitely fall into). It let you take notes about people you met at, say, a conference, and pick up extra information, including photos, from LinkedIn. You could then use the info and/or the photos to jog your memory.

  • Yahoo gains U.S. search share on the back of Firefox

  • How to enable Chrome's clutter-free experimental reading mode

    Other browsers have had it for years, but Chrome is finally adding a "Reader mode" that strips down an online article to its most essential parts--images and text--to make it easier to read. The new feature, dubbed Distill, is currently a work in progress but is still worth trying out for full-time Chrome users.

  • PSA: House of Cards season 3 is here

    Netflix's flagship original series House of Cards is back for a third season, dropping into an escalating war over original content.

  • The FCC's net neutrality ruling: 5 things you need to know

    Advocates for open access to the Internet were popping champagne corks on Thursday after the Federal Communications Commission voted in favor of reclassifying broadband Internet as a public utility. In addition to regulating fixed broadband lines that go into your home, the FCC vote also extended public utility rules to mobile broadband for the first time.