Adobe code signing infrastructure hacked by 'sophisticated threat actors'
Summary: The eyebrow-raising hack effectively gave the attackers the ability to create malware masquerading as legitimate Adobe software and signals a raising of the stakes in the world of Advanced Persistent Threats (APTs).

Adobe today warned that an internal server with access to its digital certificate code signing infrastructure was hacked by "sophisticated threat actors" engaged in "highly targeted attacks."
The compromise, which dates back to early July, led to the creation of at least two malicious files that were digitally signed using a valid Adobe certificate, according to Adobe security chief Brad Arkin.
Although only two files were signed, the hack effectively gave the attackers the ability to create malware masquerading as legitimate Adobe software and signals a raising of the stakes in the world of Advanced Persistent Threats (APTs).
According to Arkin, one of the two digitally signed malware files is a utility that extracts password hashes from the Windows operating system. This hints at the "lateral movement" that is common once a targeted attacker gains access to a network and attempts to elevate privileges to gain a higher level of access.
"The first malicious utility we received is pwdump7 v7.1. This utility extracts password hashes from the Windows OS and is sometimes used as a single file that statically links the OpenSSL library libeay32.dll. The sample we received included two separate and individually signed files. We believe the second malicious utility, myGeeksmail.dll, is a malicious ISAPI filter. Unlike the first utility, we are not aware of any publicly available versions of this ISAPI filter," Arkin explained.
"Within minutes of the initial triage of the first sample, we decommissioned our signing infrastructure and began a clean-room implementation of an interim signing service for re-signing components that were signed with the impacted key after July 10, 2012 and to continue code signing for regularly scheduled releases. The interim signing solution includes an offline human verification to ensure that all files scheduled for signature are valid Adobe software. We are in the process of designing and deploying a new, permanent signing solution," Arkin added.
Adobe did not provide details on the nature of the breach except to say that it affected a "build server" with access to the code signing infrastructure. Arkin said the compromised machine's configuration was "not to Adobe corporate standards for a build server" and lamented the fact that this was not caught during the normal provisioning process.
"We are investigating why our code signing access provisioning process in this case failed to identify these deficiencies. The compromised build server did not have rights to any public key infrastructure (PKI) functions other than the ability to make code signing requests to the code signing service," he added.
Arkin said a forensics investigation identified malware on the build server and the likely mechanism used to first gain access to the build server.
"We also have forensic evidence linking the build server to the signing of the malicious utilities. We can confirm that the private key required for generating valid digital signatures was not extracted from the HSM. We believe the threat actors established a foothold on a different Adobe machine and then leveraged standard advanced persistent threat (APT) tactics to gain access to the build server and request signatures for the malicious utilities from the code signing service via the standard protocol used for valid Adobe software," he added.
Arkin says there is no evidence that source code was stolen during the compromise.
Adobe plans to revoke the impacted certificates on October 4, 2012.
The revocation will affect all code signed after July 10, 2012, which indicates the attackers had access to Adobe's infrastructure for more than two months.
Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.
Talkback
if anyone needed unequivocal evidence
"Adobe did not provide details on the nature of the breach except to say that it affected a "build server" with access to the code signing infrastructure. Arkin said the compromised machine's configuration was "not to Adobe corporate standards for a build server" and lamented the fact that this was not caught during the normal provisioning process.
Of course ... it's *nothing to be concerned about* ... it was 'only' a build server .. [gobsmacked :O].
"We are investigating why our code signing access provisioning process in this case failed to identify these deficiencies. The compromised build server did not have rights to any public key infrastructure (PKI) functions other than the ability to make code signing requests to the code signing service," he added.
Sure this time it had no direct PKI rights this time ... that's so assuring for their corporate, entrenched product user base.
The big takeaway today? When a vendor of corporate documentation applications cannot safeguard it's internal systems through a well planned, tested (..and retested) and deployed security management processes, what chance do their hapless corporate client-base have?
Disgraceful, completely unnerving and frightening all at the same time.
Hater
It was not a major issue.
Any company is vulnerable to such problems, because
no software is perfect,
no architecture is perfect,
humans are not perfect.
Um, yes it is
I don't agree with thx's tone, but it's hardly a non event?
but...
trust
Adobe reader
*face-palm*
"And lamented the fact that this was not caught during the normal provisioning process"
Kind of not noticing, not the noticing it happened nearly 3 months ago kind of noticing.
Bandwagoning? I just don't see the logical opposing argument given that my own argument was neither doom, despair nor exacerbating the situation. I Merely commented that this is a significant security event, and implied it is not an every day event for a major software developer.
That given, what is your "off the beaten path" opinion of this news? It's not relevant news? It is not a note worthy security breach? I simply do not follow that "logic"?
Magic Indians Didn't Do Their Jobs
Adobe outsourced their soul to India
Adobe, the creator of flash cookies, the insidious side step around preventing outside software and web apps from stuffing info into your computer. Apple has it right, no Flash. +1 for turning off Adobe automatic updates. What a farce of invasive useless crudding up of a Windows machine.
Stupid is as stupid does
There is no real excuse for poor security and incompetence, would adobe's apologist be happier if we called pickles just a distressed cucumbers because it's not the cucumbers fault?
No, Adobe is just plain incompetent
Uhmm . . .
Kudo to Adobe for disclosing
Should be revoked TODAY . . .
Eh, what? Revoke them as soon as you learn about the incident. Don't wait. You don't want to give anybody a window of opportunity.
July
C'mon HTML5, or whatever...
I'd almost bet..
Ignorance reigns...
I'm not even sure the author is aware of this...instead he is contributing to the misinformation that is everywhere.
BTW, where are your signed HTML5 apps? lol
ZDNet...stop the hate.
that sound like a very smart attack...
Its like, someone got in cheekily, dressed up properly in your clothes and got out neatly...:-)
Another Week . . .