home.social

#digicert — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #digicert, aggregated by home.social.

  1. Just about the entire internet uses certificate authorities to establish trust. Here, a simple old-school social engineering trick broke this trust and allowed hackers to get signed certificates from DigiCert for their malware.

    There is a better way to establish certificate trust that doesn't rely on a 3rd party, and it's free too. It's called DANE, which binds the trust directly to the Domain Name System by using DNSSEC. DANE is ideal for code signing certificates (and other uses), but is overlooked.

    This attack is virtually impossible under DANE. A vulnerable support person is of no use. Hackers would need to directly compromise the target's DNS infrastructure, the registrar, and the top-level domain authority. All three. Nearly impossible compared to just finding some dupe at the CA in a public chat room.

    hackread.com/hackers-digicert-

    #DANE #CertificateAuthorities #DigiCert

  2. Just about the entire internet uses certificate authorities to establish trust. Here, a simple old-school social engineering trick broke this trust and allowed hackers to get signed certificates from DigiCert for their malware.

    There is a better way to establish certificate trust that doesn't rely on a 3rd party, and it's free too. It's called DANE, which binds the trust directly to the Domain Name System by using DNSSEC. DANE is ideal for code signing certificates (and other uses), but is overlooked.

    This attack is virtually impossible under DANE. A vulnerable support person is of no use. Hackers would need to directly compromise the target's DNS infrastructure, the registrar, and the top-level domain authority. All three. Nearly impossible compared to just finding some dupe at the CA in a public chat room.

    hackread.com/hackers-digicert-

    #DANE #CertificateAuthorities #DigiCert

  3. Just about the entire internet uses certificate authorities to establish trust. Here, a simple old-school social engineering trick broke this trust and allowed hackers to get signed certificates from DigiCert for their malware.

    There is a better way to establish certificate trust that doesn't rely on a 3rd party, and it's free too. It's called DANE, which binds the trust directly to the Domain Name System by using DNSSEC. DANE is ideal for code signing certificates (and other uses), but is overlooked.

    This attack is virtually impossible under DANE. A vulnerable support person is of no use. Hackers would need to directly compromise the target's DNS infrastructure, the registrar, and the top-level domain authority. All three. Nearly impossible compared to just finding some dupe at the CA in a public chat room.

    hackread.com/hackers-digicert-

    #DANE #CertificateAuthorities #DigiCert

  4. Just about the entire internet uses certificate authorities to establish trust. Here, a simple old-school social engineering trick broke this trust and allowed hackers to get signed certificates from DigiCert for their malware.

    There is a better way to establish certificate trust that doesn't rely on a 3rd party, and it's free too. It's called DANE, which binds the trust directly to the Domain Name System by using DNSSEC. DANE is ideal for code signing certificates (and other uses), but is overlooked.

    This attack is virtually impossible under DANE. A vulnerable support person is of no use. Hackers would need to directly compromise the target's DNS infrastructure, the registrar, and the top-level domain authority. All three. Nearly impossible compared to just finding some dupe at the CA in a public chat room.

    hackread.com/hackers-digicert-

    #DANE #CertificateAuthorities #DigiCert

  5. Just about the entire internet uses certificate authorities to establish trust. Here, a simple old-school social engineering trick broke this trust and allowed hackers to get signed certificates from DigiCert for their malware.

    There is a better way to establish certificate trust that doesn't rely on a 3rd party, and it's free too. It's called DANE, which binds the trust directly to the Domain Name System by using DNSSEC. DANE is ideal for code signing certificates (and other uses), but is overlooked.

    This attack is virtually impossible under DANE. A vulnerable support person is of no use. Hackers would need to directly compromise the target's DNS infrastructure, the registrar, and the top-level domain authority. All three. Nearly impossible compared to just finding some dupe at the CA in a public chat room.

    hackread.com/hackers-digicert-

    #DANE #CertificateAuthorities #DigiCert

  6. 📢⚠️ Hackers tricked #DigiCert support staff into executing a malicious file, allowing attackers to obtain code-signing certificates later used to sign malware. DigiCert revoked 60 certificates after the breach was reported.

    Read: hackread.com/hackers-digicert-

    #CyberSecurity #Malware #InfoSec #CyberAttack #DataBreach

  7. #DigiCert customer support compromised with .scr ZIP attachment 🤷

    During our investigation between 2026-04-14 and 2026-04-17, as DigiCert identified certificates potentially affected by the threat actor’s actions, we revoked them. DigiCert revoked 60 certificates issued from the following CAs:

    • DigiCert Trusted G4 Code Signing RSA4096 SHA256 2021 CA1
    • DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
    • GoGetSSL G4 CS RSA4096 SHA256 2022 CA-1
    • Verokey High Assurance Secure Code EV

    https://bugzilla.mozilla.org/show_bug.cgi?id=2033170

    #x509 #infosec

  8. Habe übrigenz noch bis Freitag spät andends mit den Zertifizierungsstellen gekämpft und nach zähem Ringen wenigstens die wichtigesten Zertifikate erneuert bekommen und deployed, der Rest muss noch warten.

    Am Mittwoch waren die noch paralysiert, dann wurden sie überrannt und Chaos brach aus. Selbstverständlich sowohl da als auch bei uns entscheidende Leute im Urlaub - fatal bei EV-Zertifikaten. 3 Tage Frust pur. Und das wird sich sicher noch bis Ende der nächsten Woche ziehen, bis alle noch ausstehenden Zertifikate erneuert wurden - andere Konzernteile haben noch gar nicht reagiert.

    Tatsächlich hat in dieser Nacht #SSLlabs alle bislang noch nicht aktualisierten Auftritte runtergestuft auf 'F - This server's certificate is not trusted'.

    Bislang habe ich selbst noch keinen Browser gesehen, der Warnungen ausgesprochen hat und den Zugriff blockiert, aber das wird nicht mehr lange dauern - Google ist da schnell und gnadenlos. spätestens dann wird der Aufschrei groß sein.

    Und die Indizes der Suchmaschinen werden auch schlechter geranked.

    Danke für nichts, #DigiCert!