Incident: Adobe Code-Signing System Breach: Malware Signed with Valid Certificate

Published Date: 2012-09-27

Postmortem Analysis
Timeline 1. The software failure incident involving the breach of Adobe's code-signing system and the signing of malware with a valid Adobe certificate occurred on July 26 of the year mentioned in the article [14504]. Therefore, the software failure incident happened in July of the same year as the article, which is 2012.
System 1. Adobe's code-signing system [14504] 2. Adobe's compromised build server [14504]
Responsible Organization 1. Attackers breached Adobe's code-signing system and used a valid digital certificate from Adobe to sign their malware [14504].
Impacted Organization 1. Adobe - The software failure incident involving the breach of Adobe's code-signing system impacted the company directly as attackers were able to sign their malware with a valid Adobe certificate [14504].
Software Causes 1. Breach of Adobe's code-signing system by attackers who accessed a compromised build server, allowing them to sign their malware with a valid Adobe certificate [14504].
Non-software Causes 1. Compromised build server that had access to the signing system [14504] 2. Breach of the build server leading to the ability to sign malicious programs with a valid certificate [14504]
Impacts 1. Attackers breached Adobe's code-signing system and used it to sign their malware with a valid digital certificate from Adobe, impacting the security and trust in Adobe's software [14504]. 2. At least two malicious utility programs were signed with the valid Adobe certificate, potentially compromising the affected Adobe software running on the Windows platform and three Adobe AIR applications running on both Windows and Macintosh [14504]. 3. Adobe had to revoke the compromised certificate and planned to issue new certificates for legitimate Adobe products that were also signed with the same certificate, affecting the authentication and integrity of Adobe's software [14504]. 4. The breach raised concerns about the security of Adobe's source code, although investigators found no evidence that the intruders had changed source code or stolen any source code [14504]. 5. The incident highlighted the importance of digital certificates in establishing trust between software makers and users, as attackers who can sign their malware with a valid certificate can bypass protective barriers and install rogue code without warning [14504].
Preventions 1. Implementing stricter access controls and monitoring on build servers to prevent unauthorized access and tampering [14504]. 2. Regularly auditing and reviewing the security measures in place for code-signing systems to identify and address vulnerabilities promptly [14504]. 3. Enhancing the security of hardware security modules storing private keys for signing certificates to prevent unauthorized access [14504]. 4. Conducting thorough security assessments and penetration testing on critical systems like build servers to identify and mitigate potential risks [14504].
Fixes 1. Revoking the compromised digital certificate and issuing new certificates for legitimate Adobe products signed with a new certificate could help fix the software failure incident [14504].
References 1. Brad Arkin, senior director of product security and privacy for Adobe [14504] 2. Adobe spokeswoman Liebke Lips [14504] 3. Symantec [14504] 4. Wired [14504]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the breach of Adobe's code-signing system and the signing of malware with a valid Adobe certificate is an example of a failure happening again within the same organization. This incident is not the first time Adobe has faced security challenges. In the past, Adobe was hacked around the same time as Google and other companies in 2010, although it was not confirmed if the same attackers were responsible for hacking Adobe [14504]. (b) The incident involving the breach of digital certificates and the signing of malware with valid certificates has also occurred at other organizations. For example, Stuxnet, a piece of malware designed to sabotage Iran's nuclear program, was the first malicious code discovered in the wild to use a valid digital certificate. In that case, the attackers stole digital certificates from two companies in Taiwan to sign part of their code [14504].
Phase (Design/Operation) design (a) The software failure incident in the article was related to the design phase. The breach occurred due to attackers compromising a build server that had the ability to get code approved from Adobe's code-signing system. This allowed the attackers to sign their malware with a valid digital certificate from Adobe, slipping past protective barriers that prevent unsigned software from installing automatically on a machine [14504]. (b) The software failure incident was not related to the operation phase or misuse of the system.
Boundary (Internal/External) within_system (a) within_system: The software failure incident involving Adobe's compromised code-signing system was primarily due to contributing factors that originated from within the system. Attackers breached a build server that had access to the signing system and were able to sign their malicious programs with a valid Adobe certificate [14504]. Adobe traced the problem to a compromised build server that had the ability to get code approved from the company's code-signing system, indicating an internal vulnerability that was exploited by the attackers. The breach of the build server allowed the attackers to sign malware with a valid digital certificate from Adobe, highlighting an internal security flaw within Adobe's infrastructure.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case was primarily due to non-human actions. Attackers breached Adobe's code-signing system by compromising a build server that had access to the signing system, allowing them to sign their malware with a valid Adobe certificate without human participation [14504]. (b) However, human actions were also involved in the incident as the attackers exploited vulnerabilities in the system that were potentially caused by inadequate security measures or oversight on the part of Adobe. Additionally, the response to the incident, such as revoking the certificate and re-issuing new certificates, involved human actions to mitigate the impact of the breach [14504].
Dimension (Hardware/Software) hardware, software (a) The software failure incident involving Adobe's compromised code-signing system was primarily due to a hardware-related issue. The breach occurred through a compromised build server that had access to the signing system, allowing attackers to sign their malware with a valid Adobe certificate [14504]. (b) The software failure incident also had contributing factors originating in software. The attackers were able to exploit the compromised build server to sign their malicious programs, indicating vulnerabilities in Adobe's software security measures [14504].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in this case was malicious. Attackers breached Adobe's code-signing system and used it to sign their malware with a valid digital certificate from Adobe. The attackers signed at least two malicious utility programs with the valid Adobe certificate, which were identified as "pwdump7 v7.1" and "myGeeksmail.dll" [14504]. The incident involved intentional actions by the attackers to compromise Adobe's code-signing system and sign malware with a valid certificate, indicating malicious intent to harm the system and potentially target specific entities or individuals.
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident involving Adobe's compromised code-signing system and the signing of malware with a valid Adobe certificate was primarily due to poor decisions. The breach occurred due to attackers gaining access to a compromised build server that had the ability to get code approved from the company's code-signing system [14504]. This incident highlights the importance of robust security measures and the potential consequences of inadequate security protocols in place.
Capability (Incompetence/Accidental) accidental (a) The software failure incident involving Adobe's code-signing system breach was not attributed to development incompetence but rather to attackers breaching a compromised build server that had access to the signing system [14504]. This breach allowed the attackers to sign their malware with a valid Adobe certificate, indicating a security vulnerability rather than a failure due to development incompetence. (b) The incident was accidental in the sense that Adobe did not intentionally allow the breach to occur. It was a result of attackers exploiting a compromised build server, which was not a deliberate action by Adobe but rather an unintended consequence of a security vulnerability [14504].
Duration temporary The software failure incident reported in the articles can be categorized as a temporary failure. This incident involved attackers breaching Adobe's code-signing system and using it to sign their malware with a valid digital certificate from Adobe. Adobe identified the compromised build server as the point of entry for the attackers to sign their malicious programs with the valid certificate. The company took immediate action to revoke the certificate, trace the issue, and re-issue new certificates for legitimate Adobe products signed with the same certificate [14504]. The incident was addressed promptly, and steps were taken to mitigate the impact of the breach, indicating that it was a temporary failure caused by specific circumstances rather than a permanent failure.
Behaviour other (a) crash: The software failure incident in the article does not involve a crash where the system loses state and does not perform any of its intended functions. The incident is related to a breach in Adobe's code-signing system, leading to the signing of malicious programs with a valid Adobe certificate [14504]. (b) omission: The software failure incident does not involve a failure due to the system omitting to perform its intended functions at an instance(s). Instead, the incident is about attackers breaching Adobe's code-signing system and signing malware with a valid Adobe certificate [14504]. (c) timing: The software failure incident is not related to a failure due to the system performing its intended functions too late or too early. The incident revolves around the compromise of a build server that had the ability to get code approved from Adobe's code-signing system, leading to the signing of malicious programs with a valid certificate [14504]. (d) value: The software failure incident does not involve a failure due to the system performing its intended functions incorrectly. The incident is about attackers breaching Adobe's code-signing system and using it to sign malware with a valid digital certificate from Adobe [14504]. (e) byzantine: The software failure incident does not exhibit a byzantine failure where the system behaves erroneously with inconsistent responses and interactions. The incident is focused on the compromise of a build server that allowed attackers to sign malicious programs with a valid Adobe certificate [14504]. (f) other: The behavior of the software failure incident can be categorized as a security breach leading to the unauthorized signing of malware with a valid Adobe certificate. This incident highlights a significant security vulnerability in Adobe's code-signing system, potentially impacting the trust between software makers and users [14504].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence harm, property, theoretical_consequence The consequence of the software failure incident described in the articles is primarily related to potential harm and property impact. The breach of Adobe's code-signing system and the subsequent signing of malware with a valid Adobe certificate could potentially harm users who unknowingly download and run the malicious programs signed with the compromised certificate. This harm could manifest as compromised data, privacy breaches, or other security-related issues for individuals using the affected Adobe software [14504]. Additionally, there is a theoretical consequence discussed in the articles regarding the potential impact on the security of Adobe's source code, although there is no evidence to date that any source code was stolen as a result of the breach [14504].
Domain information The software failure incident reported in Article 14504 is related to the industry of information (a). Adobe's code-signing system breach and the subsequent signing of malware with a valid Adobe certificate primarily impact software signed with the compromised certificate that runs on the Windows platform and three Adobe AIR applications that run on both Windows and Macintosh [14504]. This incident highlights the critical role of digital certificates in establishing trust between software makers and users in the information industry.

Sources

Back to List