Microsoft blacklists all DigiNotar certificates

With 500 spoofed certificates "pwn'd" by the bad guys, Microsoft wasn't the only vendor affected

Microsoft on Tuesday blacklisted all DigiNotar certificates after seeing active attacks from at least one fraudulent digital certificate issued by DigiNotar. The company has released updates for all versions of Windows with the new blacklisted data.

DigiNotar is a certification authority that is a member of the Trusted Root Certification Authorities Store. Last week, Dutch authorities and others revealed that hackers had perpetrated a massive theft of more than 500 SSL certificates in July, including several that could attempt to impersonate Microsoft's update services.

BACKGROUND: Comodo hacker claims credit for DigiNotar attack

"Based on our investigation, we've deemed all DigiNotar certificates to be untrustworthy and have moved them to the Untrusted Certificate Store," wrote Dave Forstrom, director of trustworthy computing, on the Microsoft Security Response Center blog. "Additionally, we have extended our support with this update so all customers using Windows XP, Windows Server 2003, and all Windows supported third-party applications are protected."

With 500 spoofed certificates "pwn'd" by the bad guys, Microsoft wasn't the only vendor affected. Last week the TOR Project site, also affected, released a list of all the affected websites in a blog post, and all of the CAs it found to be hosting the hacked certificates. DigiNotar released fake certificates that affected websites and services from Google, Skype, the CIA, Yahoo, Twitter, TOR, Facebook, WordPress, Windows Live, Mozilla and a number of others.

Microsoft, Google and Mozilla all acted quickly to revoke the spoofed certificates so their browsers would reject them. On Sunday, Microsoft assured its customers that the spoofed Microsoft Update certificates could not be used to install malware through Windows Update.

"Attackers are not able to leverage a fraudulent Windows Update certificate to install malware via the Windows Update servers," said Jonathan Ness, an engineer with the Microsoft Security Response Center (MSRC), in a Sunday blog post. "The Windows Update client will only install binary payloads signed by the actual Microsoft root certificate, which is issued and secured by Microsoft."

Seven of the 531 fraudulent certificates were for Microsoft-related domains including update.microsoft.com and windowsupdate.com, while another six were for *.microsoft.com, and another 17 were for live.com, Microsoft's Windows Live social network and collaboration site.

Microsoft recommends that enterprise users not using Microsoft's automatic updating service immediately install the updates. This includes a rare update for Windows Server 2008 Server Core, which is also affected.

However, more industrywide action may be needed, and Microsoft says it "has been actively collaborating with certificate authorities, governments, and software vendors to help protect our mutual customers."

This is because "the most egregious certs issued were for *.*.com and *.*.org while certificates for Windows Update and certificates for other hosts are of limited harm by comparison," according to the TOR Project blog. "The attackers also issued certificates in the names of other certificate authorities such as 'VeriSign Root CA' and 'Thawte Root CA' as we witnessed with ComodoGate, although we cannot determine whether they succeeded in creating any intermediate CA certs."

The TOR project has also named two other CAs that should be blacklisted for hosting fraudulent certificates, Koninklijke Notariele Beroepsorganisatie CA and Stichting TTP Infos CA. Microsoft did not blacklist these CAs today. Network World has asked Microsoft if it is investigating these CAs as well and will update this news story when Microsoft responds.

Julie Bort is the editor of Network World's Open Source community. She also writes the Source Seeker blog, the Odds and Ends blog for Cisco Subnet and the Microsoft Update blog for Microsoft Subnet. Follow Bort on Twitter @Julie188.

Read more about wide area network in Network World's Wide Area Network section.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags securityMicrosoft

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Julie Bort

Network World

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?