DigiNotar Fraudulent Certificates
What are DigiNotar Fraudulent Certificates?
DigiNotar Fraudulent Certificate refer to the wildcard certificate for Google by DigiNotar root CA by an attacker in 2011.
On July 10, 2011, the attacker first hacked into DigiNotar's CA systems and issued a wildcard certificate for Google. This certificate was subsequently used by unknown persons in Iran to conduct a man-in-the-middle attack against Google services.
On August 28, 2011, certificate problems were observed on multiple Internet service providers in Iran. The fraudulent certificate was posted on pastebin.
According to a subsequent news release by VASCO, DigiNotar had detected an intrusion into its certificate authority infrastructure on July 19, 2011. DigiNotar did not publicly reveal the security breach at the time.
After this certificate was found, DigiNotar belatedly admitted dozens of fraudulent certificates had been created, including certificates for the domains of Yahoo!, Mozilla, WordPress and The Tor Project.
DigiNotar could not guarantee all such certificates had been revoked. Google blacklisted 247 certificates in Chromium, but the final known total of misissued certificates is at least 531. Investigation by F-Secure also revealed that DigiNotar's website had been defaced by Turkish and Iranian hackers in 2009.
DigiNotar is no longer a trusted root CA. All certificates issued by DigiNotar are revoked.
Examples of DigiNotar issued certificates:
2016-08-13, 2036👍, 0💬
Where to click to get more Web site information in Firefox 8? I want to know if the page I am readin...
Certificate Summary: Subject: RapidSSL SHA256 CA - G4 Issuer: GeoTrust Primary Certification Authori...
Certificate summary - Owner: *.4shared.com, Domain Control Validated, *.4shared.com Issuer: SERIALNU...
Certificate Summary: Subject: www.hatena.ne.jp Issuer: Cybertrust Japan Public CA G1 Expiration: 201...
Certificate Summary: Subject: GeoTrust Primary Certification Authority - G3 Issuer: GeoTrust Primary...