FBI probes Comodo Web security breach

Compromise related to fraudulent digital certificates is traced to IP addresses in Iran, Comodo says.
(Credit: Comodo)The FBI is investigating how a hacker tricked a New Jersey company into issuing fraudulent digital certificates for Google, Yahoo, Microsoft, and other major Web sites, the firm's chief executive said today.
Comodo CEO Melih Abdulhayoglu told CNET this afternoon that "it is an ongoing investigation" that has drawn in both the FBI and Italian law enforcement.
Abdulhayoglu confirmed that a reseller in Italy called GlobalTrust had its network compromised by a hacker traced to Iran. That person, or multiple people, obtained fake digital certificates for nine Web sites that also included Skype and Mozilla. Those certificates, which have since been revoked, allowed someone to impersonate the secure versions of those Web sites--the ones that are used when encrypted connections are enabled.
"We're letting the government agencies handle the issue and figure out what exactly has happened here," Abdulhayoglu said.
The FBI did not immediately respond to a request for comment.
An unknown person using the alias "ComodoHacker" and "ichsunx" has posted proof, in the form of an encryption key, that he (or she, or they) were responsible for the intrusions or in contact with whoever was. ComodoHacker claims to be a pro-regime cryptanalyst in Iran, arguing that the country should be free to pursue its "nuclear program, as it's simple right [sic] of each nation."
Comodo's revelation last week highlights the flaws in the current method of trusting certificate authorities.
At the moment, there is no automated process to revoke fraudulent certificates. There is no public list of certificates that companies like Comodo have issued, or even which of its resellers or partners have been given a duplicate set of the master keys. There are no mechanisms to prevent fraudulent certificates for Yahoo Mail or Gmail from being issued by compromised companies, or repressive regimes bent on surveillance; Tunisia even has its own certificate-issuing government agency trusted by Internet Explorer.
CNET reporter Elinor Mills contributed to this report.
Read more: http://news.cnet.com/8301-31921_3-20048525-281.html#ixzz1IASbZSqa
- Recent posts from Privacy Inc.
- Google settles FTC charges over Buzz
- FBI probes Comodo Web security breach
- Privacy: Facebook's Achilles heel
- Why browsers differ on Web sites' safety
- Appeal filed in WikiLeaks probe of Twitter accounts
- Hackers exploit chink in Web's armor
- Google, Yahoo, Skype targeted in attack linked to Iran
- Senator pushes for mobile privacy reform
Read more: http://news.cnet.com/8301-31921_3-20048525-281.html#ixzz1IASfPD2Y
Re: "At the moment, there is no automated process to revoke fraudulent certificates."
That is a falsehood.
There are indeed mechanisms to do just that (they are called Certificate Revocation Lists or CRLs, and Online Certificate Status Protocol or OCSP. (Google 'em)
The REAL problem is that web browsers are typically setup to NOT CHECK THEM (or ignore them if they don't give them an answer they like) by default. You can't blame the CA's for that.
Once upon a time, there were only a few entities in the world that issued SSL certs, they checked applicants thoroughly, and their CA infrastructure was solid. (The prices of certs also reflected that)
Now there are all sorts of entities that issue cheap certs, and it turns out that many of them don't even engage in the trivial checking of domain ownership that they claim to do. (basically, sending an email to the registered domain owner's email contact)
As for Tunisia, I don't get the relevance. Anyone can run a CA, and if Tunisia has a history of quality dealings in the area of PKI operations, why shouldn't they get recognized by major browser vendors?
That said, this is the 2nd major security breach I am aware of that has happened to Comodo over the last few years. As a result, I am now removing my default trusted status for Comodo certs in my main web browsers, so I get a warning whenever I attempt to open a page that uses a Comodo cert, due to their security problems. If
Read more: http://news.cnet.com/8301-31921_3-20048525-281.html#ixzz1IASiuqYo