Adobe to revoke crypto key abused to sign malware apps (corrected)

Discussion in 'malware problems & news' started by ronjor, Sep 27, 2012.

Thread Status:
Not open for further replies.
  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,189
    Location:
    Texas
    http://arstechnica.com/security/2012/09/adobe-to-revoke-crypto-key-abused-to-sign-5000-malware-apps/
     
  2. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Wrote about this earlier.

    Adobe's response has been top notch when you remember what the typical CA's responses are ie: hiding it.

    This was a targeted attack - most users should not worry.
     
  3. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,617
  4. chronomatic

    chronomatic Registered Member

    Joined:
    Apr 9, 2009
    Posts:
    1,343
    So if I am understanding this correctly, Adobe has internal software build servers. Someone cracked into one of those servers, put their own malicious software on there, and then sent it on to be signed by Adobe. Are there not mechanisms in place to check *what* software is being signed? It seems to me that the Adobe signing server just blindly trusts anything that comes from its build server IP addresses. Such an amateur mistake by such a large company.

    Here is how it should work: Each Adobe developer should have his/her own key-pair. Once they get ready to send some code to the build server, they sign it first. The build server has a list of those public keys and then checks to make sure it is signed by a valid developer. From there it builds and can be sent on to be signed by the official Adobe key. And the master Adobe signing key should be locked away and air-gapped from the network.

    The weak link in this system is the developers themselves having their personal keys stolen. One way to mitigate that is to enforce a policy that the developer's development machine must never touch the network. Or perhaps instead of that they could provide them crypto-sticks where the keys are stored and, thus, cannot be stolen.

    But in any case, merely having the signing server blindly sign anything that comes from the build server was a stupid idea.
     
  5. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    The server had been misconfigured - their typical build servers would not have done this.

    They're reworking the system to ensure it doesn't happen again.
     
  6. Rumours say this is how Flame was spread?
     
  7. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Doubt it. Flame was a govt project - don't think they'd go hacking Adobe.
     
  8. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,617
    Flame has little or nothing to do with this thread. :cautious:
     
  9. chronomatic

    chronomatic Registered Member

    Joined:
    Apr 9, 2009
    Posts:
    1,343
  10. kjempen

    kjempen Registered Member

    Joined:
    May 6, 2004
    Posts:
    379
    Antivirus vendors not covering this threat so well yet...

    Check the following files in VirusTotal:

    PwDump7.exe
    MD5 hash: 130F7543D2360C40F8703D3898AFAC22
    MD5 hash of file with signature removed: D1337B9E8BAC0EE285492B89F895CADB

    libeay32.dll
    MD5 hash: 095AB1CCC827BE2F38620256A620F7A4
    MD5 hash of file with signature removed: A7EFD09E5B963AF88CE2FC5B8EB7127C

    myGeeksmail.dll
    MD5 hash: 46DB73375F05F09AC78EC3D940F3E61A
    MD5 hash of file with signature removed: 8EA2420013090077EA875B97D7D1FF07
     
  11. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,617
  12. Yeah but having your keys stolen is actually worse than having your source code taken.

    This is really really bad....
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.