Google, Microsoft and Mozilla are revoking a rogue SSL certificate that could be used to spy on e-mail accounts Google said late Sunday that an attack mounted against its Gmail service targeted users primarily located in Iran, although the company has taken steps to block further interception attempts.Google discovered that attackers had acquired a Secure Sockets Layer (SSL) certificate valid for any website in the google.com domain. The SSL certificate is used to vouch for the authenticity of websites and protect against security threats such as “man-in-the-middle” attacks.Private companies, known as certificate authorities (CAs), make money from issuing digital certificates, although experts have pointed out there are many weaknesses in how certificates are issued that could undermine security.In this case a Dutch CA, DigiNotar, issued an SSL certificate for the google.com domain on July 10, without Google’s knowledge. It has since revoked the certificate. Using a fake certificate would allow attackers to capture the login details for a person’s Gmail account without a warning coming from the browser that something suspicious is happening, allowing them access to the e-mail account.Google said “the people affected were primarily located in Iran,” although the company did not detail further if it believed their accounts were compromised. To perform the attack, an attacker would need to “poison” a Domain Name System cache. DNS is used to lookup the IP address for where a domain is located, but many organizations run their own DNS servers that caches the information to speed the lookup process up, updating it periodically.That tampering could allow a random IP address to appear as a “*google.com” site. Combined with the fraudulent certificate that fools the web browser’s warning system, a person would not know they’ve been hacked.Google uses a different CA, not DigiNotar, to issue certificates for its domains — and as an additional security measure, it codes information about that issuer into its Chrome browser. This allowed a Chrome user to flag the DigiNotar-issued certificate for google.com as fake, even though it was technically valid. The additional protection won’t work for certificates for other companies’ domains, where Google can’t know in advance who the issuing authority should be.Google said on Sunday in a blog post that it had now configured its Chrome browser to revoke SSL certificates coming from DigiNotar while the company investigates. Mozilla, the organization behind the Firefox web browser, said in a blog post that it plans to issue soon new versions of Firefox along with its Thunderbird e-mail application and SeaMonkey application suite to revoke “trust in the DigiNotar root.”Microsoft said on Monday that it would remove DigiNotar from its trusted certificate providers within its Internet Explorer browser. Apple officials could not be immediately reached. Send news tips and comments to jeremy_kirk@idg.com Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe