Security vendor Venafi surveyed 11 million publicly available IPv4 sites and found that 35 percent still use Secure Hash Algorithm 1 (SHA-1) certificates. That’s surprising, because the hash function has been considered cryptographically weak for the last decade or so. It is highly vulnerable to collision attacks, which enable attackers to spoof websites.

SHA-1: An Insecure Hash Algorithm

SecurityWeek reported that Google, Microsoft and Mozilla will stop accepting the outdated certificates in January 2017. Certificate authorities (CAs) will stop issuing them and shift to SHA-2 around the same time.

Google, however, plans to offer a workaround, Threatpost reported. Chrome will be able to discern whether certificates are chained to public or local CAs. Those linked to local trust anchors may still be used even after the deadline. Certificates are also used to decide what can and cannot be trusted during an online transaction.

According to Venafi, after January this kind of certificate use will cause major performance disruptions. For example, browsers will alert users that sites using SHA-1 are insecure and won’t display a green padlock or other symbol for secure HTTPS transactions. Browsers may even block access to sites that use the outdated certificates.

“Leaving SHA-1 certificates in place is a like putting up a welcome sign for hackers that says, ‘We don’t care about security of our applications, data, and customers,'” Kevin Bocek, chief security strategist at Venafi, wrote on the company’s blog.

Nowhere to Hide

It may not be as simple as Bocek suggested. The average organization has over 23,000 keys and certificates, and many lack the tools and visibility to detect all SHA-1 certificates present in their sites. Still, it’s critical to get ahead of the potential problems.

“Unfortunately, in January there will be nowhere for these businesses to hide,” Bocek noted. “My advice is to get a plan in place now because it will be even more difficult to fix after the deprecation deadline when things start to break.”

That’s sound advice. Things are always harder to fix when they’re broken.

More from

When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule

In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged to impair visibility of the malware’s operations. This blog will not rehash analysis of the Lazarus malware sample or Event Tracing for Windows (ETW) as that has been previously covered in the X-Force blog post. This blog will focus on highlighting the opportunities for detection of the FudModule within the…

LastPass Breaches Cast Doubt on Password Manager Safety

In 2022, LastPass suffered a string of security breaches which sparked concern among cyber professionals and those impacted by the intrusions. Some called into question the way LastPass handled and responded to the incident. In addition, the situation ignited a wider conversation about the risks linked to utilizing password managers.A password manager helps users generate strong passwords and safeguards them within a digital locker. A master password secures all data, which enables users to conveniently access all their passwords for…

The Role of Finance Departments in Cybersecurity

Consumers are becoming more aware of the data companies collect about them, and place high importance on data security and privacy. Though consumers aren’t aware of every data breach, they are justifiably concerned about what happens to the data companies collect. A recent study of consumer views on data privacy and security revealed consumers are more careful about sharing data. The majority of respondents (87%) say they wouldn’t do business with companies that appear to have weak security. Study participants also…

The One Place IT Budget Cuts Can’t Touch: Cybersecurity

If IT spending is slowing, will business leaders follow a similar approach for cybersecurity budgets? Probably not. Gartner predicts that end-user spending on both security technology and services will see an annual growth rate of 11% over the next four years. And the market is anticipated to reach $267.3 billion in 2026. Many security professionals agree that security spending cuts aren’t likely. Given the current threat landscape, strong security has quickly become a business imperative. Security has become the highest…