Private Signed Certificate From Malaysian Government Used To Spread Malware

Use Netsparker


It wasn’t too long ago (about 6 months) when we reported about Malaysia Government Sites Under Attack From Anonymous – which was somewhat suspicious. And well that’s about the only story we’ve had about Malaysia really.

Perhaps that incident and spate of attacks and intrusions had something to do with this most recent story, the story of a stolen certificate.

The story is that a ‘missing’ certificate which has been legitimately signed by the Malaysian government was stolen and has been used to sign malware, enabling it to bypass OS protection which prevents the installation of untrusted applications.

Researchers have discovered malware circulating in the wild that uses a private signing certificate belonging to the Malaysian government to bypass warnings many operating systems and security software display when end users attempt to run untrusted applications.

The stolen certificate belongs to the Malaysian Agricultural Research and Development Institute, according to Mikko Hypponen, chief research officer of F-Secure, the Finnish security firm that found it was being used to sign malware spread using booby-trapped PDF files. By using the official credential to vouch for the trustworthiness of the malicious application, the attackers were able to suppress warnings Microsoft Windows issues when users attempt to install unsigned applications.

“The malware itself has been spread via malicious PDF files that drop it after exploiting Adobe Reader 8,” Hypponen wrote in a blog post published on Monday. “The malware downloads additional malicious components from a server called worldnewsmagazines.org. Some of those components are also signed, although this time by an entity called www.esuplychain.com.tw.”

The discovery is the latest reminder of the challenges posed in securing the PKI, or public key infrastructure, used to digitally ensure the authenticity and integrity of websites and applications. With more than 600 entities entrusted to issue the certificates, all it takes is the compromise of one of them for an impostor to obtain the private key needed to issue counterfeit credentials for Google, eBay, the Internal Revenue Service or virtually any other service.

The certificate came from the Malaysian Agricultural Research and Development Institute, known locally as MARDI – http://www.mardi.my.

Please also note the fantastic aesthetics of Malaysian government web design, I’d estimate a few million USD was spent to create such a glorious website – it shows doesn’t it.

The security of Malaysian governmental website is also extremely suspect, any half decent attacker seems to be able to hack into them without much effort. Probably because most of them aren’t maintained and they are running outdated, vulnerable versions of the CMS Joomla!.


Over the past couple years, a growing number of private keys have been abused. One of the best known examples was the Stuxnet worm that sabotaged Iran’s nuclear program. It used pilfered digital keys belonging to two companies from Taiwan. The Duqu malware, which some researchers say has significant similarities to Stuxnet, also used private certificates.

Hackers recently compromised the systems of Netherlands-based certificate authority DigiNotar and minted counterfeit credentials for half a dozen sites, including Mozilla’s addons website and Skype. A bogus certificate for Gmail was used to spy on about 300,000 people accessing the service from Iran.

Two weeks ago, credentials issued by intermediate certificate authority Digicert Malaysia were banished from major browsers following revelations the company issued secure sockets layer certificates that could be used to attack people visiting Malaysian government websites. A day later, Netherlands-based KPN Corporate Market said it suspended the issuance of new certificates after discovering a security breach that allowed hackers to store attack tools on one of its servers.

The compromised certificate discovered by F-Secure shows the signer as anjungnet.mardi.gov.my. It expired at the end of September. Hypponen said Malaysian authorities have indicated the certificate was stolen “quite some time ago.”

It just goes to show how weak the whole PKI type infrastructure is, especially with the recent case – Hackers Get Hold Of Wildcard Google SSL Certificate – Could Hijack Gmail Accounts.

Of course before that we had the huge RSA SecurID case too, some quiet hacking, some stolen certificates (which are basically just text files) and bingo – you have yourself some real power there.

Sadly this kind of occurrence seems to be getting more and more common, I hope things get secured because people have been told for years that “If it’s https it’s safe!” – when clearly…that is not always the case.

Source: The Register

Posted in: Cryptography, Malware


Latest Posts:


StaCoAn - Mobile App Static Analysis Tool StaCoAn – Mobile App Static Analysis Tool
StaCoAn is a cross-platform tool which aids developers, bug bounty hunters and ethical hackers performing mobile app static analysis on the code of the application for both native Android and iOS applications.
snallygaster - Scan For Secret Files On HTTP Servers snallygaster – Scan For Secret Files On HTTP Servers
snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn't be public and can pose a s
Portspoof - Spoof All Ports Open & Emulate Valid Services Portspoof – Spoof All Ports Open & Emulate Valid Services
The primary goal of the Portspoof program is to enhance your system security through a set of new camouflage techniques which spoof all ports open and also emulate valid services on every port.
Cambridge Analytica Facebook Data Scandal Cambridge Analytica Facebook Data Scandal
One of the biggest stories of the year so far has been the scandal surrounding Cambridge Analytica that came out after a Channel 4 expose that demonstrated the depths they are willing to go to profile voters, manipulate elections and much more.
GetAltName - Discover Sub-Domains From SSL Certificates GetAltName – Discover Sub-Domains From SSL Certificates
GetAltName it's a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers.
Memcrashed - Memcached DDoS Exploit Tool Memcrashed – Memcached DDoS Exploit Tool
Memcrashed is a Memcached DDoS exploit tool written in Python that allows you to send forged UDP packets to a list of Memcached servers obtained from Shodan.


Comments are closed.