Adobe plans to revoke a code-signing certificate after hackers compromised one of the company's internal servers and used it to digitally sign two malicious utilities. "We received the malicious utilities in the late evening of Sept. 12 from a single, isolated (unnamed) source," Wiebke Lips, senior manager of corporate communications at Adobe, said Thursday via email. "As soon as the validity of the signatures was confirmed, we immediately initiated steps to deactivate and revoke the certificate used to generate the signatures."One of the malicious utilities was a digitally signed copy of Pwdump7 version 7.1, a publicly available Windows account password extraction tool that also included a signed copy of the libeay32.dll OpenSSL library.The second utility was an ISAPI filter called myGeeksmail.dll. ISAPI filters can be installed in IIS or Apache for Windows Web servers in order to intercept and modify HTTP streams.The two rogue tools could be used on a machine after it was compromised and would likely pass a scan by security software since their digital signatures would appear legitimate coming from Adobe."Some antivirus solutions don't scan files signed with valid digital certificates coming from trustworthy software makers such as Microsoft or Adobe," said Bogdan Botezatu, a senior e-threat analyst at antivirus vendor BitDefender. "This would give the attackers a huge advantage: Even if these files were heuristically detected by the locally installed AV, they would be skipped by default from scanning, which dramatically enhances the attackers' chance of exploiting the system."Adobe believes "the vast majority of users are not at risk" because tools like the ones that were signed are normally used during "highly targeted attacks," not widespread ones, he wrote.However, Botezatu couldn't say if any of these files were actively detected on computers protected by the company's products. "It's too early to tell, and we don't have sufficient data yet," he said."At the moment, we have flagged all the received samples as malicious and we continue monitoring their geographical distribution," Botezatu said.Adobe traced back the compromise to an internal "build server" that had access to its code-signing infrastructure. "Our investigation is still ongoing, but at this time, it appears that the impacted build server was first compromised in late July," Lips said."To date we have identified malware on the build server and the likely mechanism used to first gain access to the build server," Arkin said. "We also have forensic evidence linking the build server to the signing of the malicious utilities."The configuration of the build server was not up to Adobe's corporate standards for a server of this nature, Arkin said. "We are investigating why our code-signing access provisioning process in this case failed to identify these deficiencies."The misused code-signing certificate was issued by VeriSign on Dec. 14, 2010, and is scheduled to be revoked at Adobe's request on Oct. 4. This operation will impact Adobe software products that were signed after July 10, 2012."This only affects the Adobe software signed with the impacted certificate that runs on the Windows platform and three Adobe AIR applications that run on both Windows and Macintosh," Arkin said.Adobe published a help page that lists the affected products and contains links to updated versions signed with a new certificate.Symantec, which now owns and operates the VeriSign certificate authority, stressed that the misused code-signing certificate was entirely under Adobe's control. "None of Symantec's code-signing certificates were at risk," Symantec said Thursday in an emailed statement. "This was not a compromise of Symantec's code-signing certificates, network or infrastructure." Adobe decommissioned its code-signing infrastructure and replaced it with an interim signing service that requires files to be manually checked before being signed, Arkin said. "We are in the process of designing and deploying a new, permanent signing solution." "It's hard to determine the implications of this incident, because we can't be sure that only the shared samples were signed without authorization," Botezatu said. "If the password dumper application and the open-source SSL library are relatively innocuous, the rogue ISAPI filter can be used for man-in-the-middle attacks - typical attacks that manipulate the traffic from the user to the server and vice-versa, among others."