Microsoft blacklists all DigiNotar certificates

With 500 spoofed certificates "pwn'd" by the bad guys, Microsoft wasn't the only vendor affected

Microsoft on Tuesday blacklisted all DigiNotar certificates after seeing active attacks from at least one fraudulent digital certificate issued by DigiNotar. The company has released updates for all versions of Windows with the new blacklisted data.

DigiNotar is a certification authority that is a member of the Trusted Root Certification Authorities Store. Last week, Dutch authorities and others revealed that hackers had perpetrated a massive theft of more than 500 SSL certificates in July, including several that could attempt to impersonate Microsoft's update services.

BACKGROUND: Comodo hacker claims credit for DigiNotar attack

"Based on our investigation, we've deemed all DigiNotar certificates to be untrustworthy and have moved them to the Untrusted Certificate Store," wrote Dave Forstrom, director of trustworthy computing, on the Microsoft Security Response Center blog. "Additionally, we have extended our support with this update so all customers using Windows XP, Windows Server 2003, and all Windows supported third-party applications are protected."

With 500 spoofed certificates "pwn'd" by the bad guys, Microsoft wasn't the only vendor affected. Last week the TOR Project site, also affected, released a list of all the affected websites in a blog post, and all of the CAs it found to be hosting the hacked certificates. DigiNotar released fake certificates that affected websites and services from Google, Skype, the CIA, Yahoo, Twitter, TOR, Facebook, WordPress, Windows Live, Mozilla and a number of others.

Microsoft, Google and Mozilla all acted quickly to revoke the spoofed certificates so their browsers would reject them. On Sunday, Microsoft assured its customers that the spoofed Microsoft Update certificates could not be used to install malware through Windows Update.

"Attackers are not able to leverage a fraudulent Windows Update certificate to install malware via the Windows Update servers," said Jonathan Ness, an engineer with the Microsoft Security Response Center (MSRC), in a Sunday blog post. "The Windows Update client will only install binary payloads signed by the actual Microsoft root certificate, which is issued and secured by Microsoft."

Seven of the 531 fraudulent certificates were for Microsoft-related domains including update.microsoft.com and windowsupdate.com, while another six were for *.microsoft.com, and another 17 were for live.com, Microsoft's Windows Live social network and collaboration site.

Microsoft recommends that enterprise users not using Microsoft's automatic updating service immediately install the updates. This includes a rare update for Windows Server 2008 Server Core, which is also affected.

However, more industrywide action may be needed, and Microsoft says it "has been actively collaborating with certificate authorities, governments, and software vendors to help protect our mutual customers."

This is because "the most egregious certs issued were for *.*.com and *.*.org while certificates for Windows Update and certificates for other hosts are of limited harm by comparison," according to the TOR Project blog. "The attackers also issued certificates in the names of other certificate authorities such as 'VeriSign Root CA' and 'Thawte Root CA' as we witnessed with ComodoGate, although we cannot determine whether they succeeded in creating any intermediate CA certs."

The TOR project has also named two other CAs that should be blacklisted for hosting fraudulent certificates, Koninklijke Notariele Beroepsorganisatie CA and Stichting TTP Infos CA. Microsoft did not blacklist these CAs today. Network World has asked Microsoft if it is investigating these CAs as well and will update this news story when Microsoft responds.

Julie Bort is the editor of Network World's Open Source community. She also writes the Source Seeker blog, the Odds and Ends blog for Cisco Subnet and the Microsoft Update blog for Microsoft Subnet. Follow Bort on Twitter @Julie188.

Read more about wide area network in Network World's Wide Area Network section.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags Microsoftsecurity

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Julie Bort

Network World
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?