Researchers from ESET have recently spotted a new malware campaign

This malware has been made with a nasty twist.  It was created using a legitimate security certificate stolen from D-Link.

The malware appears to be the work of an Advanced Persistent Threat group known as BlackTech, which primarily targets high profile users and firms in Asia, with a particular emphasis on Japan, Hong Kong, and Taiwan.

BlackTech is responsible for two different malware families, PLEAD and the DRIGO exfiltration tool, both of which have been found to be using the stolen certificate.  ESET has also found the compromised certificate in the source code of a password stealer designed to scrape passwords from Google Chrome, Internet Explorer, Mozilla's Firefox, and Microsoft Outlook.

D-Link discovered two compromised certs

ESET reported their findings to D-Link, and company officials opened a formal investigation into the matter. They ultimately discovered not one, but two compromised certificates, both of which were revoked immediately.

Even so, this latest discovery underscores one of the dangers of our current global security architecture.  Any central point is a source of weakness.  In this case, certificates are issued by a central body to provide a layer of trust.  Software developers use certificates to demonstrate that they are legitimate pieces of code.

Whole global security network needs rethinking

That system works well, right up until the point where a hacker manages to steal one of the "trusted" certificates. Then, the weakness of the security paradigm is revealed.

This is just one of many areas of global network security that needs a top-to-bottom rethink and overhaul.  The old methods of securing our vast oceans of data just aren't working anymore.  Until something is done to change the game in the favor of security personnel, the hackers are going to have an increasingly easier time breaking in.

Our perspective

As ever, vigilance, however imperfect, is the best defense.

The author

Thanks for reading this short post. For more tips on thriving with small business technology, check out the other blog posts at DWPia Blogs. I am also available at dwpia on LinkedIn, at dwpia on Facebook, and @dwpia on Twitter.

Cloud Computing Expert | Small Business Technology Consultant | IT Services Provider | 866.995.4488

Denis S Wilson

I am President and Principal Consultant for DWP Information Architects: specializing in managed IT support for smaller healthcare practices, clinics, or insurance companies in Greater Los Angeles. And have created cost-effective IT solutions, for over 20 years, specializing in cybersecurity and regulatory compliance.

I am also a published author and speaker, working extensively with organizations that include: the State of California, the Federal Bureau of Investigation (FBI), the Small Business Administration (SBA), SCORE, Women's Business Centers, and Small Business Development Centers. As well as providing small business technology education programs to business and professional associations.

Contact me if you would like me to speak at your meeting.

Meanwhile, check out this blog post

"Cyber Security Check List That Will Underscore Your Potential Business Risks"