'No questions asked' Windows code cert slingers 'fuel trade' in digitally signed malware

Oh it's for a calculator app? OK, wink wink, say no more

Trusted code-signing certificates are being sold to miscreants by allegedly unscrupulous vendors, fueling a growth in digitally signed Windows malware, a study has claimed.

Security researchers at Masaryk University in the Czech Republic, and Maryland Cybersecurity Center (MCC) in the US, identified and monitored four organizations that sold Microsoft Authenticode certificates to anonymous buyers. The same research team also collected a corpus of Windows-targeted malware carrying valid digital signatures.

Having studied this material, the infosec bods concluded that vendors are prepared to sell Authenticode certs to anyone who can afford to pay – no questions asked. These vendors and certificates are trusted by Microsoft and its Windows operating system, so any programs, malicious or otherwise, cryptographically signed using these certs appear more legit than unsigned software.

Signed malware has a greater chance of making it past antivirus scanners and other detection mechanisms, hence why hackers strive to give their malicious code the veneer of respectability with a valid digital signature.

Although a cryptographic signature does not guarantee that software is safe to execute, it helps to establish trust in the program. Consequently, valid signatures help software nasties bypass some malware filters, the MCC-led team explained.

Echoes of Stuxnet

One well-known signed malware example is the Stuxnet worm, which was digitally signed using trusted keys stolen from two Taiwanese semiconductor companies. But the tactic is far from the preserve of high-end nuke-fuel-plant-knackering cyber-weapons like Stuxnet these days, and it crops up in even run-of-the-mill adware.

The need to bypass platform protections such as Microsoft Defender SmartScreen is driving the demand for Authenticode certificates, according to the MCC team.

Hackers are increasingly prepared to pay for code-signing certs rather than stealing these digital credentials, which is a potentially tricky process. Five certificates used to sign malware samples found by MCC had "likely been purchased" from one of the four grey market vendors it was tracking.

“Our evidence suggests that the demand is growing and that the vendors are able to obtain more certificates to respond to this demand,” Tudor Dumitras, one of the researchers and an assistant professor at the University of Maryland, told El Reg.

“The market demonstrates a degree of confidence in the reliability of the certificate supply, especially within a tightly interconnected market segment that accounts for most of the signed malware.

“Unlike in the past, the certificates from signed malware appear to be primarily obtained directly from [certificate authorities], rather than compromised.”


(Cryptographically) sign me up! Android to take bad app checks offline


The same team published a study last year detailing how miscreants abused digital certs to smuggle malware past security scanners. This followup study aims to quantify the extent of this abuse as well as sketching out the market behind it.

Flogging digital certificates from the back of a van, figuratively speaking, can be quite lucrative, the researchers found. One of the four apparently dodgy e-credential vendors tracked by the MCC team, for example, was “selling more than 10 certificates per month" netting a "total of $16,150 in revenue” over a period of roughly three months starting from August 2017 from one code-signing cert online shop.

The four allegedly shady e-credential slingers were fingered up after the researchers inspected 28 forums, six link directory websites, four general marketplaces, and dozens of websites trading black market goods.

The research Issued for Abuse: Measuring the Underground Trade in Code Signing Certificates was presented at the Workshop on the Economics of Information Security (WEIS) earlier this month. The paper is available here. The same researchers also released a list of potentially wonky certificates on signedmalware.org. ®

Similar topics

Other stories you might like

  • Assange can go to UK Supreme Court (again) to fend off US extradition bid

    Top Brit judges may consider whether an American prison is just too much

    Julian Assange has won a technical victory in his ongoing battle against extradition from the UK to the United States, buying him a few more months in the relative safety of Her Majesty's Prison Belmarsh.

    Today at London's High Court, the Lord Chief Justice of England and Wales Lord Burnett approved a question on a technical point of law, having refused Assange immediate permission to appeal to the UK Supreme Court. The WikiLeaker's lawyers had asked for formal permission to pose this legal conundrum about Assange's likely treatment in US prisons to the Supreme Court:

    Continue reading
  • They see us Cinnamon Rolling, they're rating: GeckoLinux incorporates kernel 5.16 with familiar installation experience

    A nice, clean community distro that works well

    Most distros haven't got to 5.15 yet, but openSUSE's downstream project GeckoLinux boasts 5.16 of the Linux kernel and the latest Cinnamon desktop environment.

    Some of the big-name distros have lots of downstream projects. Debian has been around for decades so has umpteen, including Ubuntu, which has dozens of its own, including Linux Mint, which is arguably more popular a desktop than its parent. Some have only a few, such as Fedora. As far as we know, openSUSE has just the one – GeckoLinux.

    The SUSE-sponsored community distro has two main editions, the stable Leap, which has a slow-moving release cycle synched with the commercial SUSE Linux Enterprise; and Tumbleweed, its rolling-release distro, which gets substantial updates pretty much every day. GeckoLinux does its own editions of both: its remix of Leap is called "GeckoLinux Static", and its remix of Tumbleweed is called "GeckoLinux Rolling".

    Continue reading
  • Running Windows 10? Microsoft is preparing to fire up the update engines

    Winter Windows Is Coming

    It's coming. Microsoft is preparing to start shoveling the latest version of Windows 10 down the throats of refuseniks still clinging to older incarnations.

    The Windows Update team gave the heads-up through its Twitter orifice last week. Windows 10 2004 was already on its last gasp, have had support terminated in December. 20H2, on the other hand, should be good to go until May this year.

    Continue reading
  • Throw away your Ethernet cables* because MediaTek says Wi-Fi 7 will replace them

    *Don't do this

    MediaTek claims to have given the world's first live demo of Wi-Fi 7, and said that the upcoming wireless technology will be able to challenge wired Ethernet for high-bandwidth applications, once available.

    The fabless Taiwanese chip firm said it is currently showcasing two Wi-Fi 7 demos to key customers and industry collaborators, in order to demonstrate the technology's super-fast speeds and low latency transmission.

    Based on the IEEE 802.11be standard, the draft version of which was published last year, Wi-Fi 7 is expected to provide speeds several times faster than Wi-Fi 6 kit, offering connections of at least 30Gbps and possibly up to 40Gbps.

    Continue reading
  • Windows box won't boot? SystemRescue 9 may help

    An ISO image you can burn or drop onto a USB key

    The latest version of an old friend of the jobbing support bod has delivered a new kernel to help with fixing Microsoft's finest.

    It used to be called the System Rescue CD, but who uses CDs any more? Enter SystemRescue, an ISO image that you can burn, or just drop onto your Ventoy USB key, and which may help you to fix a borked Windows box. Or a borked Linux box, come to that.

    SystemRescue 9 includes Linux kernel 5.15 and a minimal Xfce 4.16 desktop (which isn't loaded by default). There is a modest selection of GUI tools: Firefox, VNC and RDP clients and servers, and various connectivity tools – SSH, FTP, IRC. There's also some security-related stuff such as Yubikey setup, KeePass, token management, and so on. The main course is a bunch of the usual Linux tools for partitioning, formatting, copying, and imaging disks. You can check SMART status, mount LVM volumes, rsync files, and other handy stuff.

    Continue reading

Biting the hand that feeds IT © 1998–2022