Comodo Hacker Takes Credit For Massive DigiNotar Hack

The fallout from the recent breach of certificate authority (CA) DigiNotar continues at a rapid pace as more details about the scope of the attack come to light: More than 500 rogue digital certificates were created for such high-profile domains as cia.gov, microsoft.com, Microsoft’s windowsupdate.com, and mozilla.org, as well as one posing as VeriSign Root CA. In addition, more than 300,000 IP addresses, mostly in Iran, have been compromised.

The plot further thickened today when the hacker who breached certificate authority Comodo earlier this year claimed he was also behind the DigiNotar attack, and has hacked four more CAs, including GlobalSign and StartCom: “I told all that I can do it again, I told all in interviews that I still have accesses in Comodo resellers, I told all I have access to most of CAs,” wrote the hacker, who goes by the alias “ComodoHacker” and claims to be Iranian. He indicated that the attacks were in retaliation for the 16-year anniversary of a massacre of thousands of Muslims during the Bosnian War in the town of Srebrenica.
http://onlywire.com/r/51018346

Advertisements

About John Bertoli

I enjoy to read and write. I am an aspiring author and am interested in marketing, SEO strategies, finance, trading, and entrepreneurship. I started working at Bat Blue Corporation part-time during my senior year at Stevens Institute of Technology and continued after graduation, realizing how experienced and dedicated the Bat Blue technologists were. I serve as the Marketing Associate, in charge of writing press releases and case studies, as well as developing content for our website http://www.batblue.com. I organize exhibition events throughout the year, providing market exposure for the company and produce a daily network security newsletter sent to over 5,000 subscribers, known as The Daily Security Briefing. By utilizing Bat Blue's past achievements and current accomplishments, I strive to leverage these successes to create brand recognition and develop future opportunities for the company.
This entry was posted in Security Stories and tagged , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s