Adobe is taking steps to revoke the certificate used to create the signatures Adobe plans to revoke a code-signing certificate after hackers compromised one of the company’s internal servers and used it to digitally sign two malicious utilities. “We received the malicious utilities in the late evening of Sept. 12 from a single, isolated (unnamed) source,” Wiebke Lips, senior manager of corporate communications at Adobe, said Thursday via email. “As soon as the validity of the signatures was confirmed, we immediately initiated steps to deactivate and revoke the certificate used to generate the signatures.”One of the malicious utilities was a digitally signed copy of Pwdump7 version 7.1, a publicly available Windows account password extraction tool that also included a signed copy of the libeay32.dll OpenSSL library.The second utility was an ISAPI filter called myGeeksmail.dll. ISAPI filters can be installed in IIS or Apache for Windows Web servers in order to intercept and modify HTTP streams. The two rogue tools could be used on a machine after it was compromised and would likely pass a scan by security software since their digital signatures would appear legitimate coming from Adobe.“Some antivirus solutions don’t scan files signed with valid digital certificates coming from trustworthy software makers such as Microsoft or Adobe,” said Bogdan Botezatu, a senior e-threat analyst at antivirus vendor BitDefender. “This would give the attackers a huge advantage: Even if these files were heuristically detected by the locally installed AV, they would be skipped by default from scanning, which dramatically enhances the attackers’ chance of exploiting the system.” Adobe believes “the vast majority of users are not at risk” because tools like the ones that were signed are normally used during “highly targeted attacks,” not widespread ones, he wrote.However, Botezatu couldn’t say if any of these files were actively detected on computers protected by the company’s products. “It’s too early to tell, and we don’t have sufficient data yet,” he said.“At the moment, we have flagged all the received samples as malicious and we continue monitoring their geographical distribution,” Botezatu said.Adobe traced back the compromise to an internal “build server” that had access to its code-signing infrastructure. “Our investigation is still ongoing, but at this time, it appears that the impacted build server was first compromised in late July,” Lips said.“To date we have identified malware on the build server and the likely mechanism used to first gain access to the build server,” Arkin said. “We also have forensic evidence linking the build server to the signing of the malicious utilities.”The configuration of the build server was not up to Adobe’s corporate standards for a server of this nature, Arkin said. “We are investigating why our code-signing access provisioning process in this case failed to identify these deficiencies.” The misused code-signing certificate was issued by VeriSign on Dec. 14, 2010, and is scheduled to be revoked at Adobe’s request on Oct. 4. This operation will impact Adobe software products that were signed after July 10, 2012.“This only affects the Adobe software signed with the impacted certificate that runs on the Windows platform and three Adobe AIR applications that run on both Windows and Macintosh,” Arkin said.Adobe published a help page that lists the affected products and contains links to updated versions signed with a new certificate.Symantec, which now owns and operates the VeriSign certificate authority, stressed that the misused code-signing certificate was entirely under Adobe’s control. “None of Symantec’s code-signing certificates were at risk,” Symantec said Thursday in an emailed statement. “This was not a compromise of Symantec’s code-signing certificates, network or infrastructure.” Adobe decommissioned its code-signing infrastructure and replaced it with an interim signing service that requires files to be manually checked before being signed, Arkin said. “We are in the process of designing and deploying a new, permanent signing solution.” “It’s hard to determine the implications of this incident, because we can’t be sure that only the shared samples were signed without authorization,” Botezatu said. “If the password dumper application and the open-source SSL library are relatively innocuous, the rogue ISAPI filter can be used for man-in-the-middle attacks – typical attacks that manipulate the traffic from the user to the server and vice-versa, among others.” Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe