On Wednesday, April 25, 2018 at 10:33:59 AM UTC-7, Matthew Hardeman wrote:
> Also, during the period of the attack, they were using a self-signed
> certificate.
> 
> As yet there's no public evidence that they achieved issuance of any
> certificate.  There is some question as to whether they could have.
> 
> On Wed, Apr 25, 2018 at 12:32 PM, Matthew Hardeman <[email protected]>
> wrote:
> 
> > I seriously doubt that.
> >
> > MyEtherWallet.com is/was hosted on Amazon CloudFront, and I believe the
> > private keys for those certs stay locked at Amazon.  That was likely the
> > starter cert that MyEtherWallet.com first went with before securing an EV
> > cert.
> >
> > On Wed, Apr 25, 2018 at 11:42 AM, Santhan Raj via dev-security-policy <
> > [email protected]> wrote:
> >
> >> On Wednesday, April 25, 2018 at 1:57:28 AM UTC-7, Ryan Hurst wrote:
> >> > On Tuesday, April 24, 2018 at 5:29:05 PM UTC+2, Matthew Hardeman wrote:
> >> > > This story is still breaking, but early indications are that:
> >> > >
> >> > > 1.  An attacker at AS10297 (or a customer thereof) announced several
> >> more
> >> > > specific subsets of some Amazon DNS infrastructure prefixes:
> >> > >
> >> > > 205.251.192-.195.0/24 205.251.197.0/24 205.251.199.0/24
> >> > >
> >> > > 2.  It appears that AS10297 via peering arrangement with Google got
> >> > > Google's infrastructure to buy (accept) the hijacked advertisements.
> >> > >
> >> > > 3.  It has been suggested that at least one of the any cast 8.8.8.8
> >> > > resolvers performed resolutions of some zones via the hijacked
> >> targets.
> >> > >
> >> > > It seems prudent for CAs to look into this deeper and scrutinize any
> >> domain
> >> > > validations reliant in DNS from any of those ranges this morning.
> >> >
> >> > This is an example of why ALL CA's should either already be doing
> >> multi-perspective domain control validation or be working towards that in
> >> the very near future.
> >> >
> >> > These types of attacks are far from new, we had discussions about them
> >> back in the early 2000s while at Microsoft and I know we were not the only
> >> ones. One of the earlier papers I recall discussing this topic was from the
> >> late 08 timeframe from CMU - https://www.cs.cmu.edu/~dga/pa
> >> pers/perspectives-usenix2008/
> >> >
> >> > The most recent work on this I am aware of is the Princeton paper from
> >> last year: http://www.cs.princeton.edu/~jrex/papers/bamboozle18.pdf
> >> >
> >> > As the approved validation mechanisms are cleaned up and hopefully
> >> reduced to a limited few with known security properties the natural next
> >> step is to require those that utilize these methods to also use multiple
> >> perspective validations to mitigate this class of risk.
> >> >
> >> > Ryan Hurst (personal)
> >>
> >> What is interesting to me is the DV certificate that Amazon had issued
> >> for myetherwallet.com (https://crt.sh/?id=108721338) and this
> >> certificate expired on Apr 23rd 2018.
> >>
> >> Could it be that the attackers were using this cert all along in place of
> >> a EV cert?
> >> _______________________________________________
> >> dev-security-policy mailing list
> >> [email protected]
> >> https://lists.mozilla.org/listinfo/dev-security-policy
> >>
> >
> >

I agree and am obviously speculating at this point. 

I did see the (ridiculously silly) self-signed certificate that was used, but 
the skeptic in me keeps questioning the timeline of this attack and recent 
multiple cert issuances,
 - a self-signed cert created on 2018-03-23 and observed by Censys on 
2018-03-29 
(https://censys.io/certificates/4f151e2efd755fb1b9a4d50fa6db2af0008dff02ffbef8178be54f9db6e86d75)
 I assume this is the cert used in the attack from the screenshots 
- the self-signed cert was created exactly a year after the Amazon certificate 
was issued
- the self-signed cert was used in an attack the day when/after the Amazon DV 
cert expired (April 23rd 2018)
- additionally, and this may have nothing to do with the attack, 3 distinct EV 
certs issued to myetherwallet.com by Digicert and Comodo on 2018-03-30 and 
2018-03-31, even though the existing EV cert (issued by Digicert) was still 
valid
    - https://crt.sh/?id=370369641
    - https://crt.sh/?id=371216075
    - https://crt.sh/?id=378737050

Again, I'm obviously speculating and all this could be coincidence and business 
as usual, but if I were writing this crime novel, the plot wouldn't be "1-2 
days of attack to steal $150K" but "a year of silent attack to steal $17M and 
get caught due to an expired cert". Why would anyone with $17M want to go 
through all this trouble to steal just another $150K? 
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to