Bit9 says attack likely targeted a narrow set of companies
Limited information will be released as the investigation continues, Bit9's CTO writes
IDG News Service - Security vendor Bit9 promised to release limited details of a hack caused by a failure of the company to install the same security software on its own network that it sells to a handful of Fortune 500 companies.
Bit9, which is based in Waltham, Massachusetts, provides a platform that aims, among other functions, to block the installation of malicious applications. Although its product was not compromised, hackers found a weakness in company servers that issue code-signing certificates.
Once compromised, the hackers issued certificates for their own malicious software, which was then found on the networks of three Bit9 customers.
Bit9 doesn't list its customers by name on its website. But it says more than 1,000 companies use its software, including Fortune 500 companies in banking, energy, aerospace and defense and U.S. federal government agencies.
Bit9 CTO Harry Sverdlove wrote on Saturday: "We can only speculate, but we believe the attack on us was part of a larger campaign against a particular and narrow set of companies."
With Bit9's certificate, the malicious software looked at first glance as if it were legitimate and coming from the company. A valid certificate, however, isn't a free pass for malware since other kinds of security software may determine by its actions if an application is behaving in unusual ways and block it.
After news of the hack was broken by Krebs on Security, Bit9 CEO Patrick Morley disclosed the hack on Friday on a company blog. He wrote that "due to an operational oversight within Bit9, we failed to install our own product on a handful of computers within our network."
Limited information will be shared as the investigation continues, Sverdlove wrote. "For anyone who has ever been involved in an investigation of this type, you know that absolute or complete information is not always possible, so I can't promise that every puzzle piece will be revealed," he added.
Bit9 has shared cryptographic hashes, a kind of digital footprint of the files that were fraudulently signed with Bit9's certificate, Sverdlove wrote. The company plans to release more network information, tactics and files.
Hackers have proved adept at finding weaknesses in security vendors' systems with the intent to attack other targets further downstream.
In March 2011, RSA revealed hackers mounted an extremely sophisticated attack on its SecurID tokens, which generate one-time passcodes used to log into enterprise IT systems.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The Business Value of Continuous Delivery Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for...
- Ten Factors Shaping the Future of Application Delivery Download this research report conducted by Enterprise Management Associates (EMA) to learn how those that are seeking to accelerate application delivery are leveraging...
- Software Asset Management: Ensuring Today's Assets Today's trends like BYOD and SaaS are new and exciting in terms of how they will help make our jobs more productive but...
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success!
- Transform Your IT Service Management Watch this webinar, to learn how EasyVista can increase IT productivity & efficiency and deliver streamlined & integrated IT Service & Asset Mgmt. All Malware and Vulnerabilities White Papers | Webcasts