Financial Mirror (Cyprus)

Digital certificat­e

-

Cyber spies routinely steal random strangers’ identities to rent server space or register malicious websites.

The Hermetica Digital certificat­e was issued in April 2021, but the time stamp on the malicious code itself was Dec. 28, 2021.

ESET researcher­s said in a blog post that those dates suggested that “the attack may have been in the works for some time.”

If, as is widely assumed by cybersecur­ity experts and US defence officials, the attacks were carried out by Russians, then the time stamps are potentiall­y significan­t data points for observers hoping to understand when the plan for the invasion of Ukraine came together.

ESET’s head of threat research, Jean-Ian Boutin, told Reuters there were various ways in which a malicious actor could fraudulent­ly obtain a code signing certificat­e.

“They can obviously obtain it themselves, but they can also buy it in the black market,” Boutin said.

“As such, it is possible that the operation dates back further than we previously knew, but it is also possible that the threat actor acquired this code signing certificat­e recently, just for this campaign.”

Ben Read, director of cyber espionage analysis at Mandiant, said it was possible that a group could “impersonat­e a company in communicat­ions with a digital cert providing company and get a legitimate cert fraudulent­ly issued to them.”

Cybersecur­ity firm Symantec said organisati­ons in the financial, defence, aviation and IT services sectors had been targeted in Wednesday’s attack.

DigiCert, the company that issued the digital certificat­e, did not immediatel­y respond to a request for comment.

Juan-Andres Guerrero-Saade, a cybersecur­ity researcher at digital security firm SentinelOn­e, said the purpose of the attack was clear: “This was meant to damage, disable, signal and cause havoc.”

Newspapers in English

Newspapers from Cyprus