Wednesday, September 7, 2011

Attack on the security system of the Web

Attack on the security system of the Web

Unknown hackers bring the security mechanisms of the Internet to falter: they can exhibit themselves more than 500 web badges and certificates to spend with these captured as a Google, Facebook, or CIA. Iran is suspected behind the attack.
The scandal involving the Dutch certificate issuer DigiNotar widening. At the weekend it was revealed that far more Web sites are affected by the hacker attack than previously thought. Initially it was said that it had been forged just a Google certificate. Investigators have now discovered that the attackers are more than 500 safety certificates are issued - rearmed with the digital safety statements, they were able to engage with foreign identities in the Internet traffic, data and users tap eavesdrop. Experts suspect the Iranian government could mastermind of his attack.
The hacker break-in is so dangerous, because such certificate issuer DigiNotar actually need to provide security and confidence in the Internet. The so-called SSL certificates (Secure Socket Layer), issued by such companies confirm the identity of a Web browser, a Web site operator. They are the tool of choice if you want to protect themselves from unwanted eavesdroppers and transmit confidential data, such as in online banking.
Sandro Gaycken, IT security researcher at the Free University of Berlin, sees in the cyber-attack "a disaster". He says: "You have to trust the CA, otherwise this whole collapse of trust mechanism." Interesting are the certificates for state authorities, intelligence services, but also criminal organizations. Even so interesting that there are sometimes very regular dips in the building of such companies. For those affected, such mishaps are embarrassing: "The certification report something very reluctantly, rather attempt to regulate the first and discreetly behind your back before anyone notices."
Blackout at DigiNotar
Just as they seem to have tried at DigiNotar to sweep the incident under the rug. A report (PDF), which specializes in security auditing firm Fox-IT, according to the hackers invaded on 17 June in the systems of DigiNotar one. The burglary was discovered two days later, but there were apparently no action was taken. Only after 27 August in a Google forum on possibly fake certificates was noted that the case was made public.
The attacker had it time to install additional software to take over more servers. Only weeks later, on 10 July began, the intruder with his actual work. Over the next ten days, he turned from undisturbed at least 531 fake certificates.
The list of affected web-site gives an idea about a lot of motivation and intention of the attacker. Affected include:

    
Popular web offerings from Google, Yahoo and AOL,
    
American intelligence agencies like the CIA, British MI6 and the Israeli Mossad,
    
Update web pages from Microsoft, including windowsupdate.com and www.update.microsoft.com,
    
Pages on the Firefox browser and add-ons for Firefox can be loaded
    
Social networks like Facebook and Twitter
    
Communication services such as Skype and
    
the anonymity service gate.
This excerpt shows that the attackers wanted to illuminate his victims from all sides. The fake gateway certificate makes the anonymity service operators worried. Normally, users of this service is used to protect their identity, keep their whereabouts secret wish. The system was considered to be safe from spy attempts. With the fake certificate of the attacker's false sense of security, imagine where Tor users would use, can, to observe them at every step in the network.
Back to pen and paperIn addition, the list of false certificates covering a large extent with those certificates that have been forged in March in an attack on the certificate issuer Comodo - and not only that, in a file that left the hackers on the DigiNotar servers, he left behind digital signature as the Persian saying, Janam Fadaye Rahbar. In German: "My life for the leader." The message is identical to that which was found after the attack Comodo. Even then, you can trace the attacker to Iran, just as this time
Fox-IT was able to trace almost all access to the fake certificates to computers in Iran. Those who are outside of Iran had been the Tor network servers. They are believed by Iranians who tried to gate via anonymous access to foreign servers. Be there to pick up e-mails or to simply read the news pages, which are controlled by the State.
, The combination of these two indications suggest Roel Schouwenberg of the security software firm Kaspersky, that the attack was directed at DigiNotar of the Iranian government. This was "the most plausible scenario." Presumably, the certificates were forged, in order to listen to dissident Iranians on the Internet.
"I'm sorry"
Only to have the certificates but not sufficient. To redirect the Web surfer ever to fake websites, offers access to the DNS system (Domain Name System) would have been useful. DNS servers are something like the signs on the Internet. They translate the readable Internet addresses (www.spiegel.de) in their technical equivalents (195.71.11.67), have long lists of such address pairs. Who controls those servers in his country, can cause the browser input in any of his compatriots astray. The Iranian government would have this opportunity.
Fox-IT advises Iranian network users so, log out at least once out of all their Internet services and login again, even better, to change all passwords.
Sandro Gaycken points out, however, that one does not necessarily need a DNS access and thus contradicts the theory of a state-led attack from Iran: "It is handy if you have access to the name server, but there are also other methods - for example through slightly different URLs, or smuggled via Update Trojan. "
Against a state action also speak the words cocky, left by the attacker in a file. Among other things, he boasts that: "I have your expensive firewall, router, netHSM, unbreakable and non-circumvention hardware key." He blasphemes: "I'm sorry that you will only see this message if it is too late."
Back to paper and pencil
The aftermath of DigiNotar hacks will however be a long time and felt around the world. For example, have long criticized the civil rights organization Electronic Frontier Foundation, that nation-states control their local certification bodies and thus "compromise computer security of their own citizens" could. After the Comodo Hack IT security expert Thorsten said timber from the University of Bochum, the certificate system to SPIEGEL ONLINE for renovation. As long as there is no reform of the system, you can expect to appear again and again to be deceived with false certificates.
The Netherlands has now pulled the ripcord, DigiNotar placed under state control. But access to the emergency it will probably take a while. In his piece in the Sunday night press conference convened at least warned Justice Minister Piet Hein Donner, one could for the sites of social services, police and tax authorities do not guarantee more secure communications.
He therefore advises its citizens to resort to pen and paper.
Correction: Originally, would "Janam Fadaye Rahbar" in this text as a name. In fact, there is a Persian saying. We apologize for this error.

No comments:

Post a Comment