Skip to main content
banner image
venafi logo

Crypto Mining, Code Signing Compromise: Are Your Certificates Safe?

Crypto Mining, Code Signing Compromise: Are Your Certificates Safe?

crypto mining
March 20, 2018 | Eva Hanscom


According to research from both Venafi and Recorded Future, code signing certificates are lucrative assets for cyber criminals to buy and sell on the Dark Web. However, these certificates are rather expensive, selling for higher prices than counterfeit U.S. passports, stolen credit cards and even handguns.


Code signing certificates are used to verify the authenticity and integrity of computer applications and software, thus contributing a vital element to internet and enterprise security. Unfortunately, these assets can cause substantial damage if they fall into the wrong hands.
 

Protect your enterprise with Venafi Next Gen Code Signing
 

Earlier this month, researchers from Microsoft uncovered an intense malware campaign that impacted over 400,000 computers within 12 hours. Cyber attackers attempted to install a resource-draining currency miner through Mediget, a BitTorrent application. Distressingly, the perpetrators used compromised machine identities to kick off their campaign.
 

“To avoid detection, the malware used a valid digital certificate that Microsoft suspects was stolen from an unnamed company,” wrote Dan Goodin, security reporter for ArsTechnica. “It's not clear how the attackers managed to obtain the digital certificate. One possibility is from a thriving underground economy that sells counterfeit malware signing credentials that are unique to each buyer.”
 

This event, sadly, is just the tip of the iceberg. Compromised certificates have consistently been used in major attacks and campaigns.
 

“This cyber crime spree uses the same blueprint as Stuxnet: stolen code signing certificates,” said Kevin Bocek, chief security strategist for Venafi. “You can take down Iranian centrifuges and create a powerful network of crypto mining zombies through the same attack vectors.”
 

Unfortunately, we should expect to see similar campaigns with more frequency in the near future. “Success with this attack will only drive the misuse of code signing certificates higher. Organizations need a new approach to protect themselves. The reputation of each and every code signing certificate must be continuously scored and evaluated,” concluded Bocek.
 

Education Center: What Is Code Signing?
 

Related posts

Like this blog? We think you will love this.
graphic image of an electrically lit tunnel, apparent from the inside but invisible from the outside
Featured Blog

The Fight over DNS over HTTPS

DoH, Browsers and ISPs

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

CIO Study: Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

Forrester Consulting Whitepaper: Securing the Enterprise with Machine Identity Protection
Industry Research

Forrester Consulting Whitepaper: Securing the Enterprise with Machine Identity Protection

Machine Identity Protection for Dummies
eBook

Machine Identity Protection for Dummies

About the author

Eva Hanscom
Eva Hanscom

Eva is Public Relations Manager at Venafi. She is passionate about educating the global marketplace about infosec and machine-identity issues, and in 2018 grew Venafi's global coverage by 45%.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat