Comodo SSL 'hacker' posts proof of pwnage

By on
Comodo SSL 'hacker' posts proof of pwnage

Paste bin postings attempt to prove hacking feat.

An individual has posted a series of messages on the Paste Bin website in an attempt to claim responsibility for an attack on the security systems protecting the web services of Google, Microsoft, Skype and others.

Last week, web authentication firm Comodo warned customers that an attacker had issued a series of false SSL certificates, prompting urgent security advisories from customers including Google and Microsoft.

Now an unnamed individual has posted two messages on Paste Bin – the first claiming responsibility for the Comodo attack via a step-by-step explanation of how it was done, the second posting an alleged portion of hacked code as proof of his/her handy-work.

The poster claimed to have discovered vulnerabilities in the web site of a third party reseller that authenticates certificates on Comodo’s behalf.

Gaining full access to the web server of this third party, the hacker claimed to have stolen usernames and passwords to then log into Comodo’s systems and – apparently after writing some fake APIs – gained authorisation to generate certificates.

The poster claimed to be an Iranian man working without state sponsorship, with points to score against Western governments for what he believed was a U.S./Israeli conspiracy to target Iran via threats such as Stuxnet.

The post claimed that Stuxnet was “created by Israel and USA with millions of dollar budget, with access to SCADA systems and Nuclear softwares” and that vulnerabilities in Microsoft software exploited by Stuxnet had deliberately been left unpatched by the vendor in cooperation with US authorities.

The SSL attack would bring “equality to the internet”, the poster claimed.

“I know you are really shocked about my knowledge, my skill, my speed, my expertise and entire attack,” the post boasted. “Is there any larger target than a CA [certificate authority] in [the] internet?”

The initial post was then followed up with a sample of code which the author claimed to be “part of [the] decompiled TrustDLL” of the compromised Comodo reseller.

Chester Wisniewski, senior security advisor at Sophos said it was “impossible to tell.... if this guy was for real”.

Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

You must be a registered member of iTnews to post a comment.
| Register

Poll

New Windows 10 users, are you upgrading from...
Windows 8
Windows 7
Windows XP
Another operating system
Windows Vista
How should the costs of Australia's piracy scheme be split?
Rights holders should foot the whole bill
50/50
ISPs should foot the whole bill
Government should chip in a bit
Other
View poll archive

Whitepapers from our sponsors

What will the stadium of the future look like?
What will the stadium of the future look like?
New technology adoption is pushing enterprise networks to breaking point
New technology adoption is pushing enterprise networks to breaking point
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
The next era of business continuity: Are you ready for an always-on world?
The next era of business continuity: Are you ready for an always-on world?

Log In

Username:
Password:
|  Forgot your password?