Bit9 says attack likely targeted a narrow set of companies

Limited information will be released as the investigation continues, Bit9's CTO writes

Security vendor Bit9 promised to release limited details of a hack caused by a failure of the company to install the same security software on its own network that it sells to a handful of Fortune 500 companies.

Bit9, which is based in Waltham, Massachusetts, provides a platform that aims, among other functions, to block the installation of malicious applications. Although its product was not compromised, hackers found a weakness in company servers that issue code-signing certificates.

Once compromised, the hackers issued certificates for their own malicious software, which was then found on the networks of three Bit9 customers.

Bit9 doesn't list its customers by name on its website. But it says more than 1,000 companies use its software, including Fortune 500 companies in banking, energy, aerospace and defense and U.S. federal government agencies.

Bit9 CTO Harry Sverdlove wrote on Saturday: "We can only speculate, but we believe the attack on us was part of a larger campaign against a particular and narrow set of companies."

With Bit9's certificate, the malicious software looked at first glance as if it were legitimate and coming from the company. A valid certificate, however, isn't a free pass for malware since other kinds of security software may determine by its actions if an application is behaving in unusual ways and block it.

After news of the hack was broken by Krebs on Security, Bit9 CEO Patrick Morley disclosed the hack on Friday on a company blog. He wrote that "due to an operational oversight within Bit9, we failed to install our own product on a handful of computers within our network."

Limited information will be shared as the investigation continues, Sverdlove wrote. "For anyone who has ever been involved in an investigation of this type, you know that absolute or complete information is not always possible, so I can't promise that every puzzle piece will be revealed," he added.

Bit9 has shared cryptographic hashes, a kind of digital footprint of the files that were fraudulently signed with Bit9's certificate, Sverdlove wrote. The company plans to release more network information, tactics and files.

Hackers have proved adept at finding weaknesses in security vendors' systems with the intent to attack other targets further downstream.

In March 2011, RSA revealed hackers mounted an extremely sophisticated attack on its SecurID tokens, which generate one-time passcodes used to log into enterprise IT systems.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags intrusionsecurityBit9Exploits / vulnerabilitiesmalware

Comments

Comments are now closed

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Solutions-GigaVUE-2404

Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-2404

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.