Digital Certificates
Digital Certificates [T1596.003]
Information
Introduction
Digital Certificates [T1596.003] is a sub-technique within the MITRE ATT&CK framework under the broader Supply Chain Compromise technique (T1596). Attackers exploit digital certificates—trusted cryptographic credentials issued by certificate authorities—to masquerade as legitimate entities, bypass security controls, and execute malicious payloads. By leveraging trusted digital certificates, adversaries can effectively evade detection mechanisms that rely on certificate validation, authenticity, and trustworthiness.
Deep Dive Into Technique
Digital certificates are cryptographic documents issued by trusted Certificate Authorities (CAs) to authenticate identities of entities (e.g., websites, individuals, software vendors). Attackers typically misuse or compromise these certificates to legitimize malicious activities. Common execution methods include:
Certificate Theft or Compromise:
Attackers infiltrate organizations or third-party vendors to steal legitimate certificates.
Compromised certificates can sign malicious executables, scripts, or drivers, enabling malware to bypass endpoint protection solutions.
Fraudulent Certificate Issuance:
Attackers trick or compromise certificate authorities to issue fraudulent certificates.
Fraudulently obtained certificates are used to create malware that appears legitimate.
Certificate Misuse and Abuse:
Attackers abuse revoked or expired certificates, relying on organizations that do not properly validate certificate status.
Attackers may also misuse certificates intended for specific purposes (e.g., code signing certificates used improperly to authenticate network traffic).
Technical mechanisms typically leveraged by adversaries include:
Code Signing: Malware signed with legitimate certificates to bypass software security features such as Windows Defender SmartScreen, antivirus products, and application allow-listing.
TLS/SSL Traffic Manipulation: Attackers use legitimate certificates to facilitate secure command-and-control (C2) communications, evade network detection, and avoid suspicion.
Driver Signing: Kernel-mode drivers signed with stolen or fraudulent certificates, allowing attackers to gain privileged access and evade kernel-level protections.
Real-world procedures often observed include:
Attackers infiltrating software vendors or supply chain partners to gain access to their legitimate code signing certificates.
Malicious software updates distributed via compromised vendor update channels, signed with valid certificates.
Malware campaigns leveraging stolen certificates to evade endpoint protection mechanisms and security checks.
When this Technique is Usually Used
Attackers typically leverage digital certificates in various attack scenarios and stages, including:
Initial Access and Delivery Stage:
Attackers deliver malware via phishing emails, drive-by downloads, or compromised legitimate websites, using signed executables to evade endpoint defenses.
Execution and Persistence Stage:
Malicious payloads signed with legitimate certificates bypass application allow-listing, antivirus, and endpoint detection and response (EDR) solutions, enabling persistent footholds.
Privilege Escalation and Defense Evasion Stage:
Kernel-mode drivers or privileged executables signed with compromised certificates facilitate privilege escalation and defense evasion, allowing attackers deeper system access and persistence.
Command-and-Control (C2) Stage:
Attackers use legitimate certificates to encrypt and authenticate C2 channels, ensuring secure and stealthy communications.
Supply Chain Attacks:
Attackers compromise trusted vendors or software update mechanisms, using legitimate certificates to sign malicious updates distributed to downstream customers.
How this Technique is Usually Detected
Detection of digital certificate misuse and compromise requires a combination of security monitoring, analysis, and proactive validation techniques, including:
Certificate Transparency Monitoring:
Continuously monitor public Certificate Transparency (CT) logs for unauthorized or suspicious certificates issued for organizational domains.
Endpoint Detection and Response (EDR) Solutions:
Identify anomalous signed binaries or scripts executing within the environment.
Detect suspicious processes or drivers signed with certificates not previously observed or trusted.
Network Monitoring and TLS Inspection:
Inspect encrypted network traffic to detect anomalous or unauthorized certificates used in C2 communications.
Implement SSL/TLS interception and proxying to identify malicious encrypted sessions.
Certificate Revocation Checks:
Regularly verify certificate status through Certificate Revocation Lists (CRLs) or Online Certificate Status Protocol (OCSP) to detect revoked or expired certificates in use.
Behavioral Analysis and Anomaly Detection:
Identify unusual certificate usage patterns, such as certificates suddenly used for code signing when historically used only for web authentication.
Correlate certificate usage with threat intelligence data and known malicious indicators.
Indicators of Compromise (IoCs) specific to digital certificate misuse may include:
Unexpected certificates issued for critical domains.
Certificates issued by unauthorized or unrecognized certificate authorities.
Signed binaries or drivers appearing unexpectedly within systems.
Certificates previously revoked or expired still in active use.
Unusual certificate attributes or metadata (e.g., issuer, validity dates, subject names).
Why it is Important to Detect This Technique
Detecting misuse or compromise of digital certificates is critical due to the significant risks posed to organizations, including:
Trust Exploitation:
Digital certificates inherently establish trust, and their misuse undermines organizational security posture, allowing attackers to bypass security controls.
Defense Evasion and Persistence:
Malware signed with legitimate certificates evades antivirus, endpoint detection tools, and application allow-listing, enabling long-term persistence and stealthy operations.
Data Exfiltration and Espionage:
Attackers leveraging certificates for secure C2 channels can exfiltrate sensitive data without triggering alarms, leading to severe data breaches and intellectual property loss.
Supply Chain Compromise:
Compromised certificates enable attackers to infiltrate trusted software supply chains, potentially affecting numerous downstream organizations and customers.
Reputation Damage and Compliance Violations:
Failure to detect and respond to certificate misuse can lead to regulatory fines, legal consequences, and significant reputational harm.
Early detection allows organizations to:
Quickly revoke compromised certificates to limit attacker capabilities.
Contain and remediate intrusions before significant damage occurs.
Prevent lateral movement and further compromise within networks.
Strengthen overall security posture and maintain trust with customers and partners.
Examples
Real-world examples of digital certificate misuse and compromise include:
Stuxnet Attack (2010):
Attackers compromised legitimate code signing certificates from Realtek and JMicron.
Malicious drivers signed with these stolen certificates bypassed security controls, enabling sabotage of Iranian nuclear centrifuges.
Operation ShadowHammer (ASUS Supply Chain Attack, 2019):
Attackers compromised ASUS update servers and signed malware with authentic ASUS certificates.
Malicious updates delivered to thousands of customers, bypassing endpoint security and antivirus solutions.
Flame Malware (2012):
Attackers exploited weaknesses in Microsoft’s Terminal Server Licensing Service to create fraudulent certificates.
Malware signed with fraudulent certificates enabled espionage activities, evading detection for prolonged periods.
CCleaner Supply Chain Attack (2017):
Attackers infiltrated Piriform’s build environment, signing malicious CCleaner updates with legitimate certificates.
Malware delivered to millions of users, enabling attackers to target specific organizations for further exploitation.
NVIDIA Certificate Compromise (2022):
Attackers obtained NVIDIA code signing certificates following a data breach.
Certificates used to sign malware and malicious drivers, enabling attackers to bypass Windows security measures.
These examples highlight the severe impacts and widespread consequences of digital certificate misuse, emphasizing the critical need for robust detection and response capabilities.
Last updated
Was this helpful?