Skip to navigation
Latest News

Iran targets Gmail and Skype with fake SSL hack

security

By Nicole Kobie

Posted on 24 Mar 2011 at 08:12

Iran has tricked a web firm into issuing fake security certificates for Gmail, Skype, Hotmail and more.

Comodo Group, a US-based certificate authority firm with 15% of the market, admitted that one of its affiliate's accounts in Southern Europe had been hacked, letting the attackers create fake SSL security certificates for six websites.

Such digital keys let websites offer secure services, and fake versions could be used to spoof sites, gather login details and watch user activity.

The fake certificates target Microsoft's Live platform, Gmail and Google, Skype, Yahoo, and Mozilla Firefox extensions. The attack was quickly discovered, with the attacker still using the account when it was shut down.

Even most geeks wouldn't notice this was going on

Comodo's CEO Melih Abdulhayogl said the attack appeared to originate in Iran, as it would have required access to the country's DNS infrastructure. "We believe these are politically motivated, state-driven/funded attacks," he said in a blog post, adding it was the first such state attack he'd seen against the authentication layer of the web.

Phillip Hallam-Baker, principal scientist for Comodo, said the timing of the attack was no coincidence.

"It does not escape notice that the domains targeted would be of greatest use to a government attempting surveillance of internet use by dissident groups," he said in a blog post.

"The attack comes at a time when many countries in North Africa and the Gulf region are facing popular protests and many commentators have identified the internet and in particular social-networking sites as a major organising tool for the protests," he added.

What it means

F-Secure's chief research officer Mikko Hypponen explained what a government could do with such a certificate. "If you are a government and able to control internet routing within your country, you can reroute all, say, Skype users to fake https://login.skype.com and collect their usernames and passwords, regardless of the SSL encryption seemingly in place," he said in a post on the F-Secure blog.

"Or you can read their email when they go to Yahoo, Gmail or Hotmail. Even most geeks wouldn't notice this was going on," he said.

Microsoft has issued a patch to block the fake certificates, after being alerted to the trouble on 16 March. The patch will go out immediately to anyone with automatic updates turned on.

"In addition, browsers which have enabled the Online Certificate Status Protocol (OCSP) will interactively validate these certificates and block them from being used," Microsoft said.

Subscribe to PC Pro magazine. We'll give you 3 issues for £1 plus a free gift - click here
Be the first to comment this article

You need to Login or Register to comment.

(optional)

advertisement

Latest Blog Posts Subscribe to our RSS Feeds
Latest ReviewsSubscribe to our RSS Feeds
Latest Real World Computing

advertisement

Sponsored Links
 
SEARCH
Loading
WEB ID
SIGN UP

Your email:

Your password:

remember me

advertisement


Hitwise Top 10 Website 2010
 
 

PCPro-Computing in the Real World Printed from www.pcpro.co.uk

Register to receive our regular email newsletter at http://www.pcpro.co.uk/registration.

The newsletter contains links to our latest PC news, product reviews, features and how-to guides, plus special offers and competitions.