Malware pushers have adapted to new Windows restrictions on files signed with SHA-1-based digital certificates As the IT industry is working to phase out the aging SHA-1 hashing algorithm it’s not just website owners and software developers who are scrambling to replace their digital certificates: Cybercriminals are following suit too. Researchers from Symantec have recently found new samples of the Carberp.B online banking Trojan that were digitally signed with not one, but two stolen certificates: one using a SHA-1 signature and one using a SHA-2 signature. “It can be safely surmised that the malware author used certificates containing differing algorithms with the hope of thwarting detection,” the Symantec researchers said in a blog post. The SHA-1 hashing function is in the process of being retired because it is theoretically vulnerable to attacks that could result in forged digital certificates and it’s only a matter of time before someone gains the capability to do this. Last year Microsoft made changes to its crypto libraries so that Windows 7 and higher and Windows Server will no longer trust code signed with a SHA-1 based certificate if its timestamp is later than Jan. 1, 2016. The restriction applies only to files that Windows flags as being obtained from the Internet, which is the case for most malware. Digitally-signed malware used to be a rare occurrence, but over the past couple of years the number of such programs has increased in response to operating systems making it harder to run non-signed files. For example, Windows displays User Account Control (UAC) security warnings for unsigned executable files that try to gain administrator privileges while the latest versions of Apple’s Mac OS X only allow applications to run if they have been downloaded from the Mac App Store or if they have been signed with a developer certificate obtained from Apple. Aside from bypassing these restrictions, cybercriminals have also figured out that having multiple digital signatures on a single file can have other benefits. Since the certificates used to sign malware are typically stolen from legitimate organizations and not bought by the attackers themselves, the likelihood of those thefts being discovered and the certificates being revoked by their legitimate owners is high. Having two signatures on a single file ensures that even if one certificate is revoked, the file will still appear as trusted thanks to the other signature. “The attacks with Carberp also point to a shift towards using digital certificates with SHA-2,” the Symantec researchers said. “While the move from SHA-1 to SHA-2 may not be instant because legacy systems do not support the newer algorithm, these attacks do indicate that change is on the way.” Users shouldn’t allow files to run just because they appear to be signed with a valid certificate. How the file was obtained is always more important than its signature, because here’s always the possibility that a legitimate developer was compromised and had his code-signing certificate stolen. As digital certificates have become valuable targets for cybercriminals, it is important for owners of such certificates to maintain strong cybersecurity practices and make sure that they are stored securely. Related content analysis BGP: What is border gateway protocol, and how does it work? BGP is how the autonomous networks that make up the internet share routing information to find the best route for IP traffic. CISA describes BGP as 'the most important part of the internet you’ve probably never heard of.' By Keith Shaw May 17, 2024 11 mins Routers Internet Network Security feature Red Hat seeks to be the platform for enterprise AI By Maria Korolov May 17, 2024 12 mins Linux Network Management Software news FCC proposes BGP security measures Protecting the Border Gateway Protocol is as important as protecting the border. By Gyana Swain May 17, 2024 4 mins Regulation Network Security brandpost Sponsored by Zscaler 5 Must-haves for your next DSPM solution Elevating cloud security: Navigating the data storm with DSPM By Kalie Radsmikham, Sr. Director of Product Marketing, Cloud Security May 16, 2024 7 mins Cloud Computing PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe