Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 28 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Researcher warns on PrivDog software as "more scary" than Superfish

by The Gurus
February 23, 2015
in Editor's News
Share on FacebookShare on Twitter

Software named PrivDog will intercept every certificate and replace it with one signed by its root key, according to research.
 
That includes certificates that weren’t valid in the first place. “It will turn your browser into one that just accepts every HTTPS certificate out there, whether it’s been signed by a certificate authority or not,” researcher Hanno Böck said.
 
As well as that, it directs to a webpage that has a self-signed certificate and adds another self-signed certificate with 512-bit RSA built into the root certificate store of Windows. All other certificates are replaced by 1024-bit RSA certificates signed by a locally created PrivDog certificate authority.
In an update posted by Böck to his blog, he said the TLS interception behaviour is part of the latest version of PrivDog 3.0.96.0, which can be downloaded from the PrivDog webpage. As Comodo Internet Security bundles an earlier version of PrivDog that works with a browser extension, it is not directly vulnerable to this threat. According to online sources PrivDog 3.0.96.0 was released in December 2014 and changed the TLS interception technology.
 
Currently, PrivDog is shipped with products produced by Comodo. Bromium co-founder and CTO, Simon Crosby, said: “PrivDog is in every sense as malicious as Superfish. It intercepts and decrypts supposedly secure communication between the browser and a remote site (such as the user’s bank), ostensibly to insert its own advertising into pages in the browser.
 
“It is substantially more scary though because PrivDog effectively turns your Browser into one that just accepts every HTTPS certificate out there without checking its validity, increasing vulnerability to phishing attacks, for example.”
 
Mark James, security specialist at ESET, recommended uninstalling the stand-alone version of Privdog or the Lavasoft Ad-aware web companion, making sure you remove the associated root certificates as soon as possible.
 
“The stand-alone version of Privdog when installed recreates  a key/cert on each installation, it will intercept every certificate it finds and then replace it with one signed by its root key, this enables it to replace adverts in web pages with its own ads from ‘Trusted Sources’,” he said.
 
“The implications are massive. One of the biggest problems here is the fact that it will replace certificates with a valid certificate even if the original cert was not valid for any reason. This means it essentially makes your browser accept every HTTPS certificate regardless if it’s been signed by a certificate authority or not.
 
“By comparison, the Superfish ‘man-in-the-middle’ process at least requires the name of the targeted website to be inserted into the certificates alternate name field. Although Superfish allows the possibility of massive exploitation, with this flaw it is still marginally better than what Privdog is doing.”
 
UPDATE –

In an 
advisory, Privdog said that PrivDog 3.0.105.0 has been released with a fix to address the security issue found in the third party library.
“A minor intermittent defect has been detected in a third party library used by the PrivDog standalone application which potentially affects a very small number of users,” it said. “This potential issue is only present in PrivDog versions, 3.0.96.0 and 3.0.97.0. The potential issue is not present in the PrivDog plug-in that is distributed with Comodo Browsers and Comodo has not distributed this version to its users.”
It said that there is potentially a maximum of 6,294 users in the USA (57,568 users globally) that this could potentially impact. It confirmed that the third party library used by PrivDog is not the same third party library used by Superfish, and that the issue potentially affects a very limited number of websites.

FacebookTweetLinkedIn
Tags: CertificateSSLSuperfish
ShareTweet
Previous Post

Lenovo says it is focusing on fixing Superfish fails, as software company dismisses “significant misinformation”

Next Post

Privdog confirm removal of self-signed certificate issue

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information