Sunday, February 9, 2025
HomeCryptocurrency hackNew Method to Establish Covert Channel Communication by Abusing X.509 Digital Certificates

New Method to Establish Covert Channel Communication by Abusing X.509 Digital Certificates

Published on

SIEM as a Service

Follow Us on Google News

Security researchers from Fidelis identified a new method to establish a covert channel communication by abusing widely implemented X.509 public key certificates. Certificates remain as a critical component of secure connection to a website.

When a browser establishes a secure connection to a site, it checks that the server has the private key for the certificate it’s trying to use, this is no one can use our certificate.

A TLS X.509 certificate would have many fields Version, signature algorithm, Validity, subject and so on. Data transferred within X.509 extension can bypass the detection methods, attackers could take it as an advantage to hide data in any one of these fields.

Also Read Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack

The covert channel is not a new one, history reveals various publications, there are methods to exfiltrate data by using ICMP shell, yes PING as great convert channel to get victim shell access using ICMP Shell.

Jason from Fidelis describes a system that could be used to send or receive data from both a client and a server perspective utilizing research into X.509 certificates specifically in areas where you can place arbitrary binary data into the certificate or utilizing them as a covert channel. The research demonstrates that a sufficiently motivated attacker can utilize technologies outside of their intended purposes to not only accomplish their goals but also end up bypassing common security measures in the process.

Researchers published a PoC explaining the malicious binary could be transferred over TLS traffic that stimulates the malware that already installed in the system.

Abusing X.509 Digital Certificates

Mitigations

Researchers suggested mitigations and the detection are possible by creating YARA and Suricata rule by pivoting SSL handshake to detect unexpected extensions and large octet lengths.

Due to widespread of X.509 certificates, most of the organizations are open to attack, disabling the self-signed as like in the PoC could be an effective security measure.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows...

PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner

Researchers observed a URL attempts to exploit a server-side vulnerability by executing multiple commands...

The Defender vs. The Attacker Game

The researcher proposes a game-theoretic approach to analyze the interaction between the model defender...