Malware is a short name for malicious software and is software that helps hackers disrupt computer operations, collect information, or gain unauthorized access to certain applications.
Fraudulent or stolen certificates?
Below is an excerpt from Gostev’s blog: (http://threatpost.com/en_us/blogs/snack-attack-analyzing-flames-replication-pattern-060712)
“What we’ve found now is better than any zero-day exploit. It actually looks more like a “god mode” cheat code – valid code signed by a keychain originating from Microsoft,” Gostev wrote in his blog.
It looks like Microsoft is taking this seriously and addressing this in upcoming releases as discussed Dark Reading’s article, Microsoft Hardens Windows Update After Flame Attacks. Microsoft has admitted the problem, revoked the certificate and posted the following:
“Microsoft is aware of active attacks using unauthorized digital certificates derived from a Microsoft Certificate Authority. An unauthorized certificate could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. This issue affects all supported releases of Microsoft Windows.” http://technet.microsoft.com/en-us/security/advisory/2718704
How did the digital certificate get signed?
There has been substantial speculation that Flame was created by the US or Israeli governments. If I were a betting man, I’d say that the speculation will now turn to conspiracy theories concerning how the creators of Flame got their hands on this certificate. It is possible that they tricked the certificate authority. Conspiracy theorists will certainly argue that there was active and knowing cooperation by parties at the certificate authority.
Digital certificates and web application security
Secure website communication relies on the same underlying technology as the code-signing certificate authority model. This kind of weakness can be used to compromise trusted communications with websites.