Attackers behind espionage software that infected Iranian computers targeted hard-to-exploit weaknesses in a cryptographic algorithm, a feat that allowed them to counterfeit a Microsoft digital credential, a member of the company’s security team said.
Details of the “cryptographic collision attack,” which came in a blog post published Monday afternoon, are the latest testament to the skill and sophistication that went into engineering the Flame malware. While theoretical, collision exploits in real-world attacks are virtually unheard of. As a 2008 attack on the MD5 cryptographic algorithm demonstrated, collision attacks require huge amounts of computing power, even when exploiting decades-old hashing functions. To pull it off, researchers had to wield the power of 200 PlayStation 3 gaming consoles.
Cryptographic algorithms are used to transform words, documents, or computer files into ciphertext that can never be converted back to their original form. These hash functions are used to digitally sign e-mails, ensure documents haven’t been tampered with, and verify that software and software updates available online originated with a particular person or group. The integrity of the entire system relies on each unique piece of plaintext almost always generating a unique string of ciphertext. The ability for someone to find a collision, in which two different plaintext sources generate the same ciphertext, completely undermines the system, since it relies on the plaintext remaining secret and unique.
The latest disclosure from Microsoft came about 24 hours after members of its security team revealed that the Flame architects exploited weaknesses in an older cryptographic hash in conjunction with weaknesses in its Terminal Server product. The technique allowed the attackers to create a fraudulent intermediate certificate authority that contained the imprimatur of Microsoft’s own root authority certificate. The bogus certificate was used to trick people into installing various Flame software modules by falsely certifying they were produced by Microsoft. The company didn’t elaborate on the algorithm exploit until it published Monday’s post.

Loading comments...