Story image

SSL/TLS certificate marketplaces thriving on dark web - study

07 Mar 2019

Machine identity protection solutions provider Venafi has today announced the first set of findings from an academic study of the availability of SSL/TLS certificates on the dark web and their role in the cybercrime economy.

The research, sponsored by Venafi and undertaken by researchers at the Evidence-based Cybersecurity Research Group at the Andrew Young School of Policy Studies at Georgia State University and the University of Surrey uncovered thriving marketplaces for TLS certificates sold individually and packaged with a wide range of crimeware.

Together, these services deliver machine-identities-as-a-service to cybercriminals who wish to spoof websites, eavesdrop on encrypted traffic, perform man-in-the-middle attacks and steal sensitive data.

“This study found clear evidence of the rampant sale of TLS certificates on the dark net,” says Venafi security and threat intelligence vice president Kevin Bocek.

“TLS certificates that act as trusted machine identities are a key part of cybercriminal toolkits – just like bots, ransomware and spyware. There is a lot more research to do in this area, but every organisation should be concerned that the certificates used to establish, and maintain, trust and privacy on the internet are being weaponised and sold as commodities to cybercriminals.”

Key study findings include:

  • Five of the Tor network markets observed offer a steady supply of SSL/TLS certificates, along with a range of related services and products.

  • Prices for certificates vary from $260 to $1,600, depending on the type of certificate offered and the scope of additional services.

  • Researchers found extended validation certificates packaged with services to support malicious websites such as Google-indexed “aged” domains, after-sale support, web design services, and integration with a range of payment processors – including Stripe, PayPal and Square.

  • At least one vendor on BlockBooth promises to issue certificates from reputable Certificate Authorities along with forged company documentation – including DUNS numbers. This package of products and services allows attackers to credibly present themselves as a trusted US or UK company for less than $2,000. 

One representative search of these five marketplaces uncovered 2,943 mentions for “SSL” and 75 for “TLS.”

In comparison, there were just 531 mentions for “ransomware” and 161 for “zero days.”

It was also evident that some marketplaces – such as Dream Market – appear to specialise in the sale of TLS certificates, effectively providing machine-identity-as-a-service products.

In addition, researchers found that certificates are often packaged with other crimeware, including ransomware.  

“One very interesting aspect of this research was seeing TLS certificates packaged with wrap-around services – such as web design services – in order to give attackers immediate access to high levels of online credibility and trust,” says Evidence-based Cybersecurity Research Group director, security researcher and report author Dr David Maimon.

“It was surprising to discover how easy and inexpensive it is to acquire extended validation certificates, along with all the documentation needed to create very credible shell companies without any verification information.”

Voter vulnerabilities: Cybersecurity risks impact national elections
The outcome of elections have an enormous impact on the political and cultural landscape of any democratic society. 
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."
Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
IXUP goes "post-quantum" with security tech upgrade
The secure analytics company has also partnered with Deloitte as a reseller, and launched a SaaS offering on Microsoft Azure.
Infoblox appoints channels head for A/NZ
Kenneth Cartwright’s appointment extends Infoblox’s position in secure cloud-managed network services throughout the region.