October 15, 2015 By Douglas Bonderud 2 min read

How do Web users know they’re not getting scammed? While there are no absolutes online, it’s common practice to look for the green padlock symbol next to a site’s URL: If it’s there, the site uses SSL/TLS certificates to safeguard user data. According to Naked Security, however, fraudsters have now obtained legitimate digital certificates from major certificate authorities (CAs), which they’re using to dupe visitors into giving up personal information. Has the green padlock become just another tool for scammers?

Reeling in Victims With Digital Certificates

Here’s the best-case scenario for phishers: Create a website that seems legitimate, usually by slightly misspelling the name of a popular bank or service and then pasting familiar logos and login buttons across the page to convince users the site is above-board. Security has improved, with in-browser defenses and more tech-savvy users leading to a much tougher market for phishers — they cast just as much but reel in far, far less.

Part of the user vetting process, however, is checking for SSL/TLS certificates. If a site displays the green padlock, it must be doing something right. Right?

According to CSO Online, not always. Enterprising scam artists have taken their fraudulent websites to CAs in hopes of passing muster and being granted certificates. Critical oversight should stop these fraudsters from getting the green light. But U.K. network monitoring company Netcraft said that in just one month, major CAs have issued hundreds of SSL certificates to deceptive domain names. What gives?

Placing Blame

Netcraft points the finger at major CAs like Symantec, GoDaddy, Comodo and CloudFlare for doing a poor job of vetting potential applicants. Some should be easy marks — domains like banskfamerica.com and emergencypaypal.net are clearly meant to reel in potential victims.

Others aren’t so obvious, but CAs are supposed to apply the same level of diligence no matter the applicant or the type of certificate. The easiest to obtain are domain-validated (DV) certificates, which cost around $10 and only require CAs to check that applicants own the domain they intend to use.

The problem? A combination of automated issuing processes and lax controls — such as simply sending an email to the domain administrator on file — make it easy for scammers to sneak through the gaps. Trell Rohovit of startup CA Hydrant ID told CSO Online that this means “a bad guy only has to beat one process/person/or email and — puff — your brand just flew out the proverbial Internet window.”

In theory, DVs with suspicious names are supposed to undergo more thorough vetting, and rogue CAs should be revoked once reported. But supposed to and should are cold comfort for users scammed by sites carrying the padlock logo since encryption doesn’t equal safety when it’s not possible to confirm who’s running the show at the other end.

Cert Uncertainty

With digital certificates now big business — and initiatives like Let’s Encrypt now rolling out free certificates in an effort to encrypt the Web — the rise of SSL/TLS scammers poses a real problem for Web security at large. As it stands, CAs are the weak link in the chain; the green padlock only has meaning when not just anyone has access to the key.

There are two ways for this to go: a revamp of existing cert procedures to safeguard users and boost the reputation of SSL/TLS certificates, or an evolution of Web security that puts the onus on browsers and users to ensure their safety rather than relying on certificate middlemen.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today