The breached web server was isolated from other infrastructure, GlobalSign said GlobalSign expects to bring its certificate-issuing systems back online on Monday, and resume business Tuesday, it said over the weekend. The U.S. certificate authority (CA) stopped issuing new SSL certificates last Tuesday in order to audit its security, after being named as a target by the hacker who claimed to have attacked Dutch CA DigiNotar.The server hosting GlobalSign’s website was breached, the company said Friday. The server was isolated from other infrastructure related to certificates, the company said.On Sunday the company confirmed its earlier plan to bring system components back online Monday in a sequenced startup, but said customers were unlikely to be able to process orders until Tuesday morning.It said that there was no further evidence of breach other than the isolated web server. But it continued to monitor all activity to all services closely as an additional precaution, it said. All forensics are being shared with the authorities and other CAs to assist with their own investigations into other potentially related attacks, GlobalSign said. It did not specify who the attacker was.The company has employed security firm Fox-IT to investigate. Fox-IT already has experience of this kind of investigation: It was hired by DigiNotar to discover how its servers were hacked. DigiNotar’s servers had been used to issue hundreds of fake SSL certificates, including one for the domain google.com. The attack on DigiNotar was discovered when an Iranian Gmail user noticed something amiss with the webmail service, and the problem was traced to the fake certificate.Close to 300,000 unique IP addresses from Iran requested access to google.com between Aug. 4 and Aug. 29, while the rogue certificate was in use, according to Fox-IT’s interim report for DigiNotar.A hacker claimed last Monday in a message on Pastebin that he had broken into DigiNotar, and also had access to four other CAs including GlobalSign. The hacker is known as Ich Sun, or Comodohacker — a reference to the person’s claims earlier this year to have broken into the servers of another certificate issuer, Comodo.John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John’s e-mail address is john_ribeiro@idg.com Related content news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe