KPN said it does not appear any fraudulent SSL certificates were issued, though The largest telecommunications company in the Netherlands has stopped issuing SSL (Secure Sockets Layer) certificates after finding indications that the website used for purchasing the certificates may have been hacked.The backend infrastructure used to generate certificates does not appear to have been affected, although an investigation is under way with results expected soon, KPN spokeswoman Simona Petescu said on Monday.During an audit, the public-facing website showed indications that someone may have tried to prepare it for Distributed Denial-of-Service (DDOS) attacks as long as four years ago, according to a press release issued on Friday by KPN.It does not appear that any fraudulent SSL certificates have been created, Petescu said. But as a precaution, it stopped issuing certificates and also notified the Dutch government’s interior affairs ministry, she said. KPN’s corporate IT services branch, KPN Corporate Market, issues the SSL certificates, which enable a Web browser and website to exchange encrypted information using the SSL protocol. KPN’s Corporate Market is known as an intermediate Certificate Authority, one of hundreds of businesses and organizations around the world that can issue SSL certificates linked backed to a so-called root Certificate Authority. CAs are a particularly attractive target for hackers. Creating a fraudulent certificate can make it appear a person is visiting a legitimate website when in fact it is not or to intercept information. Security experts have called the current SSL issuing system weak.Last week, a Malaysian intermediate certificate authority called Digicert revoked 22 of its own certificates due to weak RSA encryption keys and missing certificate extensions. On Thursday, Mozilla and Microsoft revoked all certificates issued by the company.In August, a Certificate Authority called DigiNotar, which is a subsidiary of Vasco Data Security International, revealed that it had been hacked earlier in the year. Browser makers ended up revoking some 500 fraudulent SSL certificates.Among the companies affected was Google, which said a fake certificate was used in attempted man-in-the-middle attacks against users of its Gmail service in Iran. The fraudulent certificate would allow a hacker to view information passing between a Gmail user and Google’s servers.DigiNotar filed for bankruptcy in a Dutch court in September.Send news tips and comments to jeremy_kirk@idg.com Related content news New Trojan ZenRAT masquerades as Bitwarden password manager A report by Proofpoint identifies the new Trojan as undocumented and possessing information-stealing capabilities. By Lucian Constantin Sep 28, 2023 4 mins Cyberattacks Cyberattacks Cyberattacks news UK Cyber Security Council CEO reflects on a year of progress Professor Simon Hepburn sits down with broadcaster ITN to discuss Council’s work around cybersecurity professional standards, careers and learning, and outreach and diversity. By Michael Hill Sep 27, 2023 3 mins Government Data and Information Security Security Practices news FIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely. By Michael Hill Sep 27, 2023 3 mins Certifications Internet Security Security Hardware news analysis Web app, API attacks surge as cybercriminals target financial services The financial services sector has also experienced an increase in Layer 3 and Layer 4 DDoS attacks. By Michael Hill Sep 27, 2023 6 mins Financial Services Industry Cyberattacks Application Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe