Nearly every organization relies on it to confirm their code is authentic and has not been corrupted with malware. As the scope of development accelerates, modern organizations often struggle to secure and protect code signing operations. Unfortunately, bad actors are eager to take advantage of this lack of protection.
In April, security researchers uncovered Scranos, rootkit malware that was signed with a stolen certificate. A month later, Chronicle Security published a detailed report on how abused code signing certificates were used to upload malware to VirusTool. Sadly, these incidents are not unique, from PortSmash to ShadowHammer. Cyber criminals understand the value that falsified legitimacy code signing can bring to their campaigns.
“Today, every organization is a software developer building apps, libraries, containers and other tools,” said Kevin Bocek, vice president of security strategy and threat intelligence for Venafi. “However, it can be very difficult to scale code signing operations. The security procedures that protect code signing are typically seen as cumbersome, and developers often ignore them.”
“This leaves security teams in the dark and it’s very advantageous for bad actors because they understand the power and value of code signing,” Kevin continued. “From Stuxnet to everyday malware and phishing campaigns, attacks that leverage code signing evade next-generation AV detection. Stolen code signing keys are powerful cyber weapons that put companies and their customers at risk.”
In order to address these issues, Venafi recently debuted Next-Gen Code Signing, a machine identity management solution that secures code signing processes by delivering enterprise wide visibility into all code signing operations. Next-Gen Code Signing provides centralized private key storage, code signing policy enforcement, and automation while reducing code signing burden on software development teams.
In addition to securing enterprise code signing processes, Next-Gen Code Signing automates the management of all code signing private keys. Private code signing keys never leave the trusted Venafi storage platform or connected hardware security modules (HSMs). This new solution provides information security teams with comprehensive visibility and detailed intelligence about all aspects of code signing operations, including who signed the code and with which certificate, as well as who approved the request and when each action occurred. Using the intelligence gathered from code signing processes, Next-Gen Code Signing delivers compliance and audit reporting across all code signing activities.
“Next-Gen Code Signing lets software developers use the same code signing tools and does not require changes to their build environments” Bocek concludes. “It provides an invisible layer of technology that keeps code signing keys safe and out of the hands of attackers. Venafi Next-Gen Code Signing gives security teams and developers an exciting way to be both fast and safe.”