1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Malware authors quickly adopt SHA-2 through stolen code-signing certificates

Discussion in 'CSO' started by RSS, Mar 25, 2016.

  1. RSS

    RSS New Member Member

    As the IT industry is working to phase out the aging SHA-1 hashing algorithm it's not just website owners and software developers who are scrambling to replace their digital certificates: Cybercriminals are following suit too.

    Researchers from Symantec have recently found new samples of the Carberp.B online banking Trojan that were digitally signed with not one, but two stolen certificates: one using a SHA-1 signature and one using a SHA-2 signature.

    "It can be safely surmised that the malware author used certificates containing differing algorithms with the hope of thwarting detection," the Symantec researchers said in a blog post.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page