{"id":6141,"date":"2011-03-28T22:29:30","date_gmt":"2011-03-29T02:29:30","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=6141"},"modified":"2022-12-30T16:00:39","modified_gmt":"2022-12-30T21:00:39","slug":"cyber-attack-on-google-yahoo-skype-certs","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/cyber-attack-on-google-yahoo-skype-certs\/","title":{"rendered":"Cyber Attack on Google, Yahoo, Skype Certs"},"content":{"rendered":"<p><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-110264\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-4.jpg?resize=150%2C99&#038;ssl=1\" alt=\"\" width=\"150\" height=\"99\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-4.jpg?resize=150%2C99&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-4.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-4.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/em><em>TechyEye<\/em> says that the <strong>Iranian paramilitary<\/strong> &#8220;<a title=\"Wikipedia\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Basij\" target=\"_blank\" rel=\"noopener noreferrer\">Basij<\/a>&#8221; group appears to have its own <strong><a title=\"Cyberwarfare\" href=\"http:\/\/en.wikipedia.org\/wiki\/Cyberwarfare\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">cyber warfare<\/a> division<\/strong> which is launching attacks on the websites of <a title=\"Iran\" href=\"http:\/\/maps.google.com\/maps?ll=35.6833333333,51.4166666667&amp;spn=10.0,10.0&amp;q=35.6833333333,51.4166666667%20%28Iran%29&amp;t=h\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">Iran&#8217;s<\/a> &#8220;enemies.&#8221; <em>TechEye<\/em> says the paramilitary group is an arm of the <strong>&#8220;<a title=\"Army of the Guardians of the Islamic Revolution\" href=\"http:\/\/en.wikipedia.org\/wiki\/Army_of_the_Guardians_of_the_Islamic_Revolution\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Revolutionary Guard<\/a>&#8220;<\/strong>.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20201229023715\/https:\/\/www.cia.gov\/library\/publications\/the-world-factbook\/geos\/ir.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-110266 size-thumbnail\" title=\"Iran flag\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Iran_flag.gif?resize=75%2C42&#038;ssl=1\" alt=\"Iran flag\" width=\"75\" height=\"42\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Iran_flag.gif?resize=75%2C42&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Iran_flag.gif?resize=150%2C84&amp;ssl=1 150w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>The <a title=\"AP\" href=\"http:\/\/www.ap.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Associated Press<\/em><\/a> <a title=\"Iran's paramilitary launches cyber attack\" href=\"http:\/\/www.smh.com.au\/technology\/security\/irans-paramilitary-launches-cyber-attack-report-20110315-1buwc.html\" target=\"_blank\" rel=\"noopener noreferrer\">cites<\/a> General Ali Fazli, acting commander of the Basij, in the state-owned<em> IRAN<\/em> paper as saying Iran&#8217;s cyber army consists of university teachers, students, and clerics. He said its attacks were a retaliation for similar attacks on Iran. The <em>AP<\/em> quotes Fazli, &#8220;As there are cyber attacks on us, so is our cyber army of the Basij, which includes university instructors and students, as well as clerics, attacking websites of the enemy &#8230; Without resorting to the power of the Basij, we would not have been able to monitor and confront our enemies.&#8221;<\/p>\n<p>Iran has sought to master the digital world as a crucial step to prepare for what it calls &#8220;soft war&#8221;, which includes fighting against cyber attacks such as the Stuxnet computer worm that Iran said was aimed at sabotaging its uranium enrichment program.<\/p>\n<p>Until now the secretive &#8220;Cyber Army&#8221; that emerged to fight opposition websites and blogs after President Mahmoud Ahmadinejad&#8217;s disputed re-election in 2009 was believed to be part of the Revolutionary Guard. However in February according to the <em>AP<\/em>, General Mohammad Ali Jafari, signaled that the Revolutionary Guard supports the cyber army, describing it as a &#8220;defensive, security, political and cultural need for all countries&#8221;. Jafari claimed at the time that the Guard has been successful in cyber warfare.<\/p>\n<p><a href=\"https:\/\/www.comodo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-110269\" title=\"Comodo logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/comodo_logo-e1571617939534-75x28.jpg?resize=110%2C41&#038;ssl=1\" alt=\"Comodo logo\" width=\"110\" height=\"41\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/comodo_logo-e1571617939534.jpg?resize=75%2C28&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/comodo_logo-e1571617939534.jpg?resize=150%2C55&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/comodo_logo-e1571617939534.jpg?w=220&amp;ssl=1 220w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>In another <a title=\"Iran linked to CA certificate hack\" href=\"http:\/\/web.archive.org\/web\/20110803012944\/http:\/\/www.techeye.net:80\/security\/iran-linked-to-ca-certificate-hack\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a><em> TechEye<\/em> recounts a possible Iranian cyber-warfare success. The article identifies Iran as the &#8220;state player&#8221; which hacked important <a title=\"Certificate authority\" href=\"http:\/\/en.wikipedia.org\/wiki\/Certificate_authority\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Certificate Authority<\/a> (CA) certificate information at <a title=\"Comodo\" href=\"https:\/\/www.comodo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Comodo<\/a>. Digital certificates are used to vouch for the authenticity of a site owner and secure encrypted communications between sites and their users. A government that controls Internet traffic inside its country would be able to use such a server to gain access to encrypted e-mail and chat conversations and collect user names and passwords for individuals\u2019 accounts, <a title=\"Mikko Hypponen\" href=\"https:\/\/twitter.com\/mikkohypponen\" target=\"_blank\" rel=\"noopener noreferrer\">Mikko H. Hypponen<\/a>, chief research officer at <a title=\"F-Secure\" href=\"https:\/\/www.f-secure.com\/us-en\" target=\"_blank\" rel=\"noopener noreferrer\">F-Secure<\/a>, said in <a title=\"F-Secure\" href=\"http:\/\/www.f-secure.com\/weblog\/archives\/00002128.html\" target=\"_blank\" rel=\"noopener noreferrer\">a blog post<\/a>.<\/p>\n<p>Security researcher and Tor developer <a title=\"Wikipedia\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Jacob_Appelbaum\" target=\"_blank\" rel=\"noopener noreferrer\">Jacob Appelbaum<\/a> found the compromise and alerted\u00a0 Google and Mozilla.\u00a0 USERTRUST Network, a part of Comodo issued the compromised certificates. Writing from his <a href=\"https:\/\/blog.torproject.org\/blog\/detecting-certificate-authority-compromises-and-web-browser-collusion#Update\" target=\"_blank\" rel=\"noopener noreferrer\">blog <\/a>Mr. Appelbaum initially suspected the hack &#8220;was taken by a state-level adversary.&#8221; Comodo confirmed the attack and issued a statement naming Iran as the country it suspects. According to the Comodo <a title=\"Comodo Blog\" href=\"https:\/\/web.archive.org\/web\/20140214094818\/http:\/\/blogs.comodo.com:80\/it-security\/data-security\/the-recent-ra-compromise\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a>, the incident happened on March 15th, when unknown attackers managed to get access to one of the user accounts for the RA.<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>An attacker obtained the username and password of a Comodo Trusted Partner in Southern Europe. \u00a0We are not yet clear about the nature or the details of the breach suffered by that partner other than knowing that other online accounts (not with Comodo) held by that partner were also compromised at about the same time.<\/em><\/p>\n<p>The attacker used the username and password to log in to the particular Comodo RA account and effect the fraudulent issue of the certificates.<\/p>\n<p><a href=\"https:\/\/www.f-secure.com\/us-en\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-110271 size-thumbnail\" title=\"F-Secure logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/f-secure_logo-2.png?resize=75%2C75&#038;ssl=1\" alt=\"F-Secure logo\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/f-secure_logo-2.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/f-secure_logo-2.png?w=636&amp;ssl=1 636w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>According to F-Secure, the targets included <a title=\"Google\" href=\"https:\/\/www.google.com\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>), <a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a title=\"NASDAQ : MSFT\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>), and <a title=\"Yahoo\" href=\"http:\/\/www.yahoo.com\" target=\"_blank\" rel=\"noopener noreferrer\">Yahoo<\/a> (<a title=\"NASDAQ : YHOO\" href=\"https:\/\/wp.me\/p2wgaW-umn\" target=\"_blank\" rel=\"noopener noreferrer\">YHOO<\/a>):<\/p>\n<ul>\n<li>login.live.com,<\/li>\n<li>mail.google.com,<\/li>\n<li>www.google.com,<\/li>\n<li>login.yahoo.com,<\/li>\n<li>login.skype.com,<\/li>\n<li>addons.mozilla.com, and<\/li>\n<li>&#8220;Global Trustee.&#8221;<\/li>\n<\/ul>\n<p>Google patched <a title=\"Chrome\" href=\"http:\/\/www.google.com\/chrome\" target=\"_blank\" rel=\"noopener noreferrer\">Chrome<\/a> last week and Mozilla managed to include the blacklist in<a title=\"Firefox\" href=\"https:\/\/www.mozilla.com\/en-US\/firefox\/new\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Firefox 4<\/a>.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>It appears that Comodo did the right thing and made a responsible disclosure. According to reports, immediately after the breach was identified, they contacted the browser publishers and domain owners and filled them in on the situation.<\/em><\/p>\n<p><em> As for the why? There is speculation that the Iranians wanted to control their internal dissidents. If they compromise the certificates, they could set up man-in-the-middle attacks by faking some of the world&#8217;s leading sites.<\/em><\/p>\n<p><em>Some are speculating that it was China and not Iran behind this attack. The logic being, if they are good enough to take out a security company&#8217;s certificates, they are smart enough to spoof a few IP addresses as a decoy for investigators.<\/em><\/p>\n<p><strong>What do you think?<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><strong>Did Comodo act fast enough?<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><strong>Are Certificate Authority structures to complex for their own good?<\/strong><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20151123213150\/http:\/\/toinformistoinfluence.com\/2012\/09\/19\/u-s-laws-of-war-apply-to-cyber-attacks-army-news-army-times\/\" target=\"_blank\" rel=\"noopener noreferrer\">U.S.: Laws of war apply to cyber attacks &#8211; Army News &#8211; Army Times<\/a> (toinformistoinfluence.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a href=\"https:\/\/wp.me\/P2wgaW-3H\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a href=\"https:\/\/www.linkedin.com\/in\/rb48334\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Iranian paramilitary  cyber warfare division which reportedly launched attack on GOOG MSFT YHOO, Mozilla, and Skype certs.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3045,399,398,605,92,401,82,4,400],"class_list":["post-6141","post","type-post","status-publish","format-standard","hentry","category-security","tag-3045","tag-ca","tag-comodo","tag-cyberwarfare","tag-google","tag-iran","tag-microsoft","tag-security","tag-skype"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/6141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=6141"}],"version-history":[{"count":14,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/6141\/revisions"}],"predecessor-version":[{"id":130416,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/6141\/revisions\/130416"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=6141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=6141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=6141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}