Why is it important to understand and respond to threats using untrusted certificates? The report highlights how cybercriminals are increasingly misusing keys and certificates to breach organizations, elevate their privileges, and hide activity. And although they may know the risks, most organizations are unprepared to defend against these attacks.
Security Pros Know the Risks
Here are a couple survey responses that indicate that security professionals are aware of the risks associated with untrusted certificates and compromised CAs:
The major issuers of online trust will be compromised, with 90% of the respondents believing a leading CA will be breached within the next two years.
When asked what security risks would result from an untrustworthy CA issuing certificates for their browser, application, or mobile device, 58% stated they are concerned about MITM attacks and 14% had concerns about replay attacks.
They Lack Visibility into the Extent of their Risk Exposure
Although security professionals understand the types of threats that can result from misused certificates, they do not grasp the extent of their risk exposure.
Most security professionals (63%) don’t know or falsely believe that a CA secures certificates and cryptographic keys. CAs only issue and revoke certificates—they don’t monitor their use and do not provide any security for them.
When asked how many CAs are trusted on mobile devices, survey responders believe it to be a median of three. On Apple iOS devices the median response was two, when in fact the number of trusted CAs is over 240.
Security Pros Aren’t Taking Action
Maybe because of the lack of insight to the extent of their risk, security professionals aren’t taking action against current threats or establishing incident response plans that will protect them in the future when a leading CA is compromised.
Only 26% removed CNNIC from all desktops, laptops, and mobile devices after Google and Mozilla deemed CNNIC as untrustworthy to protect Chrome and Firefox users from a MITM attack. The remaining 74% are still exposed.
Most (61%) would be unprepared to promptly respond to a breach of a leading CA, relying on manual procedures performed by administrators or incident response firms to remediate (including manually addressing Vulnerability Management System data).
Worse yet, 30% either did not know what they would do or would continue using the same CA—leaving them vulnerable
What should organizations do to protect themselves? Read the report to get a 3-point recommendation plan on how to reduce the risk and impact of fraudulent issuance and misuse of certificates. The report concludes by saying we should take a lesson from nature and use the Immune System for the Internet™ to identify good vs. bad, friend vs. foe to defend against the misuse of keys and certificates.
What are your thoughts on these survey results? Is your organization prepared for the next CA compromise? How do you remediate when your certificates and keys are misused by cybercriminals?