Breaking News

Why surveillance firm Blue Coat was granted a powerful encryption certificate?

Experts discovered that the Controversial Surveillance firm Blue Coat was granted a powerful encryption certificate that can be used for web monitoring.

Once again we are here speaking about surveillance, security experts have discovered that the controversial firm Blue Coat Systems was granted  powerful encryption digital certificates.

Blue Coat sells web-monitoring software, its surveillance appliances were detected in Iran and Sudan, and Syria where the Government used the technology to persecute dissidents and activists.

It seems that the company was granted the power to issue certificates that could be used to spy on people and easily snoop on the encrypted traffic.

The certificates were issued by Symantec, but the security firm downplayed the issue explaining that the HTTPS certificate-issuing powers were assigned only for testing purposes.

The power was granted in September 2015, but the anomaly was spotted only last week, the Italian Filippo Valsorda detailed the issue in an interesting blog post.

As explained by the expert the company, which acted as intermediate Certification Authority, used digital certificates signed by a very Powerful CA, Symantec, that granted the surveillance firm the controversial power.

Basically, Symantec acted as guarantor for all certificates issued by Blue Coat, this means that when a user’s browser visited a site exposing one of such certificate it trusted it, thanks to the trust relationship between the root CA (Symantec) and the intermediate CA (Blue Coat).

“Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. They are just as powerful as root CAs, but there’s no full list of the ones your system trusts, because root CAs can make new ones at will, and your system will trust them at first sight. There are THOUSANDS logged in CT.” explained Valsorda.

“This month an interesting one popped up, generated apparently in September 2015: “Blue Coat Public Services Intermediate CA”, signed by Symantec. (No certificates signed by this CA have reached the CT logs or Censys so far.)”

Now the problem is that a Root Ca has granted this kind of  powers to a well-known surveillance firm, and we can imagine how these certificates have been used.

Filippo Valsorda provided detailed instruction on how to distrust the Blue Coat certificated on OS X system  and Windows.

As said, Symantec and Blue Coat promptly declared that the certificate was only used for testing purpose.

“We provided it because companies that want to secure private servers without the risks that come with working in the public domain is a common customer request,” Symantec spokesperson Jane Gideon told Motherboard in an email.

“Symantec has reviewed the intermediate CA issued to Blue Coat and determined it was used appropriately. Consistent with our protocols, Symantec maintained full control of the private key and Blue Coat never had access to it. Blue Coat has confirmed it was used for internal testing and has since been discontinued. Therefore, rumors of misuse are unfounded,” she wrote.

“What the certificate does not give them the ability to do is issue public certificates to other organizations,” Gideon said. “That’s the big misunderstanding.”

“This intermediate CA is for their private servers only,” she wrote.

Just for information, the certificate is still valid.

If you appreciate my effort in spreading cyber security awareness, please vote for Security Affairs as best European Security Blog. Vote SecurityAffairs in every section it is reported. I’m one of the finalists and I want to demonstrate that the Security Affairs community a great reality.

https://www.surveymonkey.com/r/secbloggerwards2016

Thank you

Pierluigi

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Blue Coat digital certificates, surveillance)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Palo Alto Networks fixed multiple privilege escalation flaws

Palo Alto Networks addressed multiple vulnerabilities and included the latest Chrome patches in its solutions.…

15 hours ago

Unusual toolset used in recent Fog Ransomware attack

Fog ransomware operators used in a May 2025 attack unusual pentesting and monitoring tools, Symantec…

18 hours ago

Paraguay Suffered Data Breach: 7.4 Million Citizen Records Leaked on Dark Web

Resecurity researchers found 7.4 million records containing personally identifiable information (PII) of Paraguay citizens on…

1 day ago

Apple confirmed that Messages app flaw was actively exploited in the wild<gwmw style="display: none; background-color: transparent;"></gwmw>

Apple confirmed that a security flaw in its Messages app was actively exploited in the…

2 days ago

Trend Micro fixes critical bugs in Apex Central and TMEE PolicyServer

Trend Micro fixed multiple vulnerabilities that impact its Apex Central and Endpoint Encryption (TMEE) PolicyServer…

2 days ago