{"id":3695,"date":"2017-05-20T09:37:27","date_gmt":"2017-05-20T14:37:27","guid":{"rendered":"http:\/\/blog.zoha-islands.com\/?p=3695"},"modified":"2017-05-20T09:37:27","modified_gmt":"2017-05-20T14:37:27","slug":"alert-rogue-certificates","status":"publish","type":"post","link":"https:\/\/zoha-islands.com\/blog\/alert-rogue-certificates\/","title":{"rendered":"[ALERT] Rogue Certificates"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-3698\" src=\"https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2017\/05\/ssl-certifacates.jpg\" alt=\"\" width=\"391\" height=\"174\" srcset=\"https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2017\/05\/ssl-certifacates.jpg 321w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2017\/05\/ssl-certifacates-300x134.jpg 300w\" sizes=\"(max-width: 391px) 100vw, 391px\" \/>Security experts advise us not to enter passwords, credit card details, or other sensitive information on any website that does not provide an encrypted connection, and to use a bookmark to access sites that deal with banking or other private matters. But there&#8217;s a new threat being used by clever hackers to thwart both of those measures. Read on for details\u2026<\/p>\n<p>Do You Have a Rogue Certificate?<br \/>\nRemember hacks in secondlife are on the rise sadly Linden Labs does not have trusted certificates but they are protected and trusted.<\/p>\n<p>It\u2019s easy to tell if your connection to a site is encrypted. At the left end of the URL address bar, you will see a padlock icon and the \u201chttps\u201d protocol label; it literally means \u201cHTTP Secure.\u201d<\/p>\n<p>A secure connection SHOULD tell you two things. First, no one can eavesdrop on the data that flows back and forth between your browser and the site, because all traffic is encrypted. Second, the https protocol authenticates the identity of the server to which you are connected; you can rest assured that you really are connected to your bank\u2019s site and not a scammers imitation of it.<\/p>\n<p>Authentication makes use of digital certificates. A certificate is an encrypted file containing information such as the certificate holder\u2019s name, the name of the trusted authority that issued the certificate, the unique public encryption key that the certificate holder uses, and other info. Copies of certificates are kept in a trusted \u201ccertificate store.\u201d<\/p>\n<p>Rogue Certificates<\/p>\n<p>The first time you connect to a site using https, the certificate the site sends you is compared to the copy in the store; if they match, the site is authenticated. Then a copy of the certificate is stored on your computer, so future visits to that site don\u2019t have to check with the certificate authority. Instead, your browser checks the site\u2019s certificate against the copy in your local certificate store.<\/p>\n<p>Unfortunately, clever hackers have figured out ways to plant \u201crogue certificates\u201d in victims\u2019 local certificate stores, replacing your bank\u2019s trusted certificate with one that belongs to a rogue website. Now you\u2019ll see the reassuring padlock and \u201chttps\u201d even though you are not connected to the site you think you are. Also, the rogue site can now read everything you send it, including your login credentials.<br \/>\nTry This Signature Checking Tool<\/p>\n<p>A Microsoft tool called sigcheck can detect suspicious certificates in your local certificate store. You can read about all of sigcheck\u2019s features and how they work, or download the zip file containing sigcheck.<\/p>\n<p>Extract <a href=\"https:\/\/goo.gl\/TPv0nJ\">sigcheck.exe<\/a> or <a href=\"https:\/\/download.sysinternals.com\/files\/Sigcheck.zip\">sigcheck64.exe<\/a> from the zip file, depending on whether you have a 32-bit or 64-bit Windows PC. (To find out which you have, click Start -&gt; Control Panel -&gt; System. The System panel will tell you whether you have 32-bit or 64-bit Windows. If it doesn&#8217;t say either, you have a 32-bit system.)<br \/>\nTo use sigcheck, click the Start button, type \u201ccmd\u201d in the search box, and hit Enter to open a command-line window.<br \/>\nNavigate to the folder that contains the extracted sigcheck executable file<br \/>\nType \u201csigcheck -tv\u201d or \u201csigcheck64 -tv\u201d and press Enter<\/p>\n<p>This command checks your local certificate store for certificates that were not generated by a certificate authority that is known by Microsoft. There are many certificate authorities; each has its own \u201croot\u201d certificate, and Microsoft keeps a database of them. If one of your local certificates appears to be valid but wasn\u2019t created by one of the known certificate authorities, it may (or may not) be a rogue certificate.<\/p>\n<p>Ideally, you should see \u201cNo Certificates Found.\u201d If sigcheck does list some suspicious certificates, you will need to do some detective work to see which are legit and which should be deleted.<\/p>\n<p>On my test machine, sigcheck flagged two certificates from Avast, my anti-malware program. Like many security suites, Avast offers a \u201cWeb shield\u201d feature that monitors incoming browser traffic for signs of malware payloads of JavaScript attacks, and blocks them before they can do damage. To monitor an encrypted connection, Avast Web Shield has to create a certificate that allows it to read traffic. Avast needed to create a second certificate to provide real-time protection for my email, which is sent and received via encrypted connection. So these Avast certificates can remain on my machine.<\/p>\n<p>Next, there\u2019s a certificate for &#8220;Machine\\TrustedPeople:Administrator.\u201d That would be me, or anyone with administrator privileges. So this certificate can remain, too.<\/p>\n<p>Certificates for \u201cHarmony(Test)\u201d and \u201cHarmonyNew(TEST)\u201d took a bit of googling. They seem to have been created during old Java installations, and serve no purpose now. Let\u2019s delete them.<br \/>\nHow to Delete Rogue or Unnecessary Certificates<\/p>\n<p>First, I recommend that you run a full malware scan on your system before deleting any certificates, to eradicate the malware that created the certificate(s). Otherwise, the malware may simply re-create the rogue certificates.<\/p>\n<p>To delete certificates, you\u2019ll need another command-line utility called MMC.exe (Microsoft Management Console). It is built into Windows, so all you need to do is open a command-line window and enter MMC to start it. (If prompted, click YES to continue.)<\/p>\n<p>Select \u201cFile\u201d and then \u201cAdd\/Remove Snap-In\u201d<br \/>\nSelect the snap-in \u201cCertificates\u201d in the left column on the next screen, then click the \u201cAdd\u201d button to move \u201cCertificates\u201d to the right column.<br \/>\nSelect \u201cComputer account\u201d on the next screen, then click Next<br \/>\nClick Finish on the final screen without changing anything.<br \/>\nClick \u201cOK\u201d on the Add\/Remove Plug-ins screen<\/p>\n<p>Now you see a folder tree on the left. The middle window shows the selected folder\u2019s contents, if any. Drill down the folder tree to find the certificate(s) you wish to delete. Right-click on a certificate in the middle windows and select \u201cDelete\u201d to delete it.<\/p>\n<p>I know this sounds a bit geeky, but if you follow the steps carefully, it&#8217;s not so hard, and will give you extra peace of mind.<br \/>\nHave a Great week!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security experts advise us not to enter passwords, credit card details, or other sensitive information on any website that does not provide an encrypted connection, and to use a bookmark to access sites that deal with banking or other private matters. But there&#8217;s a new threat being used by clever hackers to thwart both of &hellip; <a href=\"https:\/\/zoha-islands.com\/blog\/alert-rogue-certificates\/\" class=\"more-link\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/posts\/3695"}],"collection":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/comments?post=3695"}],"version-history":[{"count":0,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/posts\/3695\/revisions"}],"wp:attachment":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/media?parent=3695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/categories?post=3695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/tags?post=3695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}