{"id":484,"date":"2017-11-08T10:56:31","date_gmt":"2017-11-08T18:56:31","guid":{"rendered":"http:\/\/www.icetips.com\/blog_wp\/?p=484"},"modified":"2017-11-08T10:56:31","modified_gmt":"2017-11-08T18:56:31","slug":"code-signing-warm-and-fuzzy","status":"publish","type":"post","link":"http:\/\/www.icetips.com\/blog_wp\/2017\/11\/08\/code-signing-warm-and-fuzzy\/","title":{"rendered":"Code signing &#8211; warm and fuzzy?"},"content":{"rendered":"<p>Couple of days ago I stumbled on an excellent article about the pitfalls of code signing!<\/p>\n<p><a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/11\/evasive-code-signed-malware-flourished-before-stuxnet-and-still-does\/\">https:\/\/arstechnica.com\/information-technology\/2017\/11\/evasive-code-signed-malware-flourished-before-stuxnet-and-still-does\/<\/a><\/p>\n<p>Couple of excerpts:<\/p>\n<hr \/>\n<p><em>\"Now, researchers have presented proof that digitally signed malware is much more common than previously believed.\"<\/em><\/p>\n<p><em>\"Surprisingly, weaknesses in the majority of available AV programs prevented them from detecting known malware that was digitally signed even though the signatures weren't valid.\"<\/em><\/p>\n<p><em>\"The third key weakness in the code-signing ecosystem was the failure of certificate authorities to verify the identities of people applying for code-signing certificates. \"<\/em><\/p>\n<p><em>\"Malware with the same digital DNA as Stuxnet\u2014Duqu discovered in 2011 and the Duqu 2.0 that\u00a0<a href=\"https:\/\/arstechnica.com\/security\/2015\/06\/stepson-of-stuxnet-stalked-kaspersky-for-months-tapped-iran-nuke-talks\/\">infected Kaspersky Lab's corporate network starting in 2014<\/a>\u2014also used code signing.\"<\/em><\/p>\n<hr \/>\n<p>Just because an executable is code signed does not really tell much.\u00a0 You can EDIT code signed executables and they will run just fine - assuming that you do not change the binary code that actually makes them run;)<\/p>\n<p>You can protect your software by validating the code signature inside the application.\u00a0 That way if the signature is tampered with, you can prevent the program from running.<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_484\" class=\"pvc_stats all  \" data-element-id=\"484\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"http:\/\/www.icetips.com\/blog_wp\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Couple of days ago I stumbled on an excellent article about the pitfalls of code signing! https:\/\/arstechnica.com\/information-technology\/2017\/11\/evasive-code-signed-malware-flourished-before-stuxnet-and-still-does\/ Couple of excerpts: \"Now, researchers have presented proof that digitally signed malware is much more common than previously believed.\" \"Surprisingly, weaknesses in the majority of available AV programs prevented them from detecting known malware that was digitally signed <a href=\"http:\/\/www.icetips.com\/blog_wp\/2017\/11\/08\/code-signing-warm-and-fuzzy\/\" class=\"more-link\">...continue reading <span class=\"screen-reader-text\">Code signing &#8211; warm and fuzzy?<\/span><\/a><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_484\" class=\"pvc_stats all  \" data-element-id=\"484\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"http:\/\/www.icetips.com\/blog_wp\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-484","post","type-post","status-publish","format-standard","hentry","category-technical"],"_links":{"self":[{"href":"http:\/\/www.icetips.com\/blog_wp\/wp-json\/wp\/v2\/posts\/484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.icetips.com\/blog_wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.icetips.com\/blog_wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.icetips.com\/blog_wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.icetips.com\/blog_wp\/wp-json\/wp\/v2\/comments?post=484"}],"version-history":[{"count":2,"href":"http:\/\/www.icetips.com\/blog_wp\/wp-json\/wp\/v2\/posts\/484\/revisions"}],"predecessor-version":[{"id":486,"href":"http:\/\/www.icetips.com\/blog_wp\/wp-json\/wp\/v2\/posts\/484\/revisions\/486"}],"wp:attachment":[{"href":"http:\/\/www.icetips.com\/blog_wp\/wp-json\/wp\/v2\/media?parent=484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.icetips.com\/blog_wp\/wp-json\/wp\/v2\/categories?post=484"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.icetips.com\/blog_wp\/wp-json\/wp\/v2\/tags?post=484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}