Thursday, April 17, 2025
HomeCryptocurrency hackNew Method to Establish Covert Channel Communication by Abusing X.509 Digital Certificates

New Method to Establish Covert Channel Communication by Abusing X.509 Digital Certificates

Published on

SIEM as a Service

Follow Us on Google News

Security researchers from Fidelis identified a new method to establish a covert channel communication by abusing widely implemented X.509 public key certificates. Certificates remain as a critical component of secure connection to a website.

When a browser establishes a secure connection to a site, it checks that the server has the private key for the certificate it’s trying to use, this is no one can use our certificate.

A TLS X.509 certificate would have many fields Version, signature algorithm, Validity, subject and so on. Data transferred within X.509 extension can bypass the detection methods, attackers could take it as an advantage to hide data in any one of these fields.

- Advertisement - Google News

Also Read Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack

The covert channel is not a new one, history reveals various publications, there are methods to exfiltrate data by using ICMP shell, yes PING as great convert channel to get victim shell access using ICMP Shell.

Jason from Fidelis describes a system that could be used to send or receive data from both a client and a server perspective utilizing research into X.509 certificates specifically in areas where you can place arbitrary binary data into the certificate or utilizing them as a covert channel. The research demonstrates that a sufficiently motivated attacker can utilize technologies outside of their intended purposes to not only accomplish their goals but also end up bypassing common security measures in the process.

Researchers published a PoC explaining the malicious binary could be transferred over TLS traffic that stimulates the malware that already installed in the system.

Abusing X.509 Digital Certificates

Mitigations

Researchers suggested mitigations and the detection are possible by creating YARA and Suricata rule by pivoting SSL handshake to detect unexpected extensions and large octet lengths.

Due to widespread of X.509 certificates, most of the organizations are open to attack, disabling the self-signed as like in the PoC could be an effective security measure.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...