Sunday, July 14, 2024

Google Announces Final Decision in Distrusting Symantec SSL Certificates

Google has made a conclusive decision on the different dates they want to execute as part of the accord plan in distrusting Symantec SSL Certificates.

Security engineers from Google and Firefox engineers discovered that Symantec misissued around 127 SSL certificates, as the investigation progress this underlying estimation developed to an outstanding figure of more than 30,000 certificates.

After the discovery, Google started removing support for Symantec SSL certificates gradually in Google Chrome. Mozilla also in the process of distrusting Symantec SSL certificates, hope they execute final plans soon. It affects Multiple brands owned by Symantec.

  • Symantec
  • GeoTrust
  • Thawte
  • RapidSSL

Symantec have been required to log all their certs to CT and so there is much better
transparency of issuance practice.

Also Read SSL/TLS Certificate Revocation is Broken Time for More Reliable Revocation Checking Mechanism

Partner Infrastructure December 1, 2017

Later Google announced SubCa proposal which was accepted by Symantec on 18th July.

The key aspect of this proposal is to exchange the authentication and issuance of certificates to a set of new SubCAs that are operated by “Managed CAs”, with the inevitable end state being a move from the current Symantec PKI to a modernized platform.

Symantec SubCAs capable of issuing SSL Certificates at this point and the certificates issued by new SubCAs infrastructure will continue to work with Chrome 70 (October 23, 2018).

It provides an option for webmasters to obtain certificates that continue to trust in Google Chrome version 70.

Chrome 66 April 17, 2018

Chrome 66 will start to show certificate errors with certificates issued by Symantec before June 1, 2016. It implies clients of Chrome 66+ won’t have the capacity to make a HTTPS connection with the site and they will get a notice.

Chrome 70 October 23, 2018

The Final stage will happen with the arrival of Chrome 70 (expected late October 2018). All Symantec certificates issued from their present roots will not be trusted on this date if legitimate re-issuance move was not made.

Webmasters and developers utilizing Symantec SSL certificates inside their application should connect with Symantec for another SSL certificate (issued through the SubCA accomplice), or contact another CA.

Here You can find alternatives for Symantec SSL Certificates

Also Read Fast and Complete SSL Scanner to Find Mis-configurations affecting TLS/SSL Severs-A Detailed Analysis


Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles