Exhibit 99.2
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535img002.jpg)
Interim Report
September 5, 2011
DigiNotar Certificate Authority breach
“Operation Black Tulip”
| | |
Classification | | PUBLIC |
Customer | | DigiNotar B.V. |
Subject: | | Investigation DigiNotar Certificate Authority Environment |
Date | | 5 September 2011 |
Version | | 1.0 |
Author | | J.R. Prins (CEO Fox-IT) |
Business Unit | | Cybercrime |
Pages | | 13 |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535img002a.jpg)
Fox-IT BV
Olof Palmestraat 6
2616 LM Delft
P.O. box 638
2600 AP Delft
The Netherlands
Phone: +31 (0)15 284 7999
Fax: +31 (0)15 284 7990
Email: fox@fox-it.com
Internet: www.fox-it.com
Copyright © 2011 Fox-IT BV
All rights reserved.
Trademark
Fox-IT and the Fox-IT logo are trademarks of Fox-IT BV.
All other trademarks mentioned in this document are owned by the mentioned legacy body or organization.
| | | | |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535g38g09.jpg)
| | PUBLIC | | 2 |
The company DigiNotar B.V. provides digital certificate services; it hosts a number of Certificate Authorities (CA’s). Certificates issued include default SSL certificates, Qualified Certificates and ‘PKIoverheid’ (Government accredited) certificates.
On the evening of Monday August 29th it became public knowledge that a rogue *.google.com certificate was presented to a number of Internet users in Iran. This false certificate had been issued by DigiNotar B.V. and was revoked1 that same evening.
On the morning of the following Tuesday, Fox-IT was contacted and asked to investigate the breach and report its findings before the end of the week.
Fox-IT assembled a team and started the investigation immediately. The investigation team includes forensic IT experts, cybercrime investigators, malware analysts and a security expert with PKI experience. The team was headed by CEO J.R. Prins directly.
It was communicated and understood from the outset, that Fox-IT wouldn’t be able to complete an in-depth investigation of the incident within this limited timeframe. This is due to the complexity of the PKI environment and the uncommon nature of the breach.
Rather, due to the urgency of this matter, Fox-IT agreed to prepare an interim report at the end of the week with its preliminary findings, which would be published.
1.2 | Investigation questions |
The investigation predominately focused on following questions:
| 1. | How did the perpetrators access the network? |
| 2. | What is the scope and status of the breach? |
| • | | Have other DigiNotar CA environments been breached? |
| • | | Do we still see hacker activity on the network of DigiNotar? |
| • | | Are rogue certificates actively being used by hackers? |
| 3. | Can we discover anything about the impact of the incident? |
| • | | What certificates were issued without knowledge of DigiNotar? |
| • | | What other (rogue) certificates might have been generated? |
| • | | How many rogue connections were made using rogue certificates? |
| • | | What was the nature of these connections? |
In order to address these questions we (basically) (i) implemented specialized monitoring to be able to detect, analyse and follow up on active misuse, and (ii) analysed digital traces on hard disks, and in databases and log files to investigate the origin and impact of the breach.
1 | Revoked: A certificate is irreversibly revoked if, for example, it is discovered that the certificate authority(CA) had improperly issued a certificate, or if a private-key is thought to have been compromised. Certificates may also be revoked for failure of the identified entity to adhere to policy requirements such as publication of false documents, mis-representation of software behavior, or violation of any other policy specified by the CA operator or its customer. The most common reason for revocation is the user no longer being in sole possession of the private key (e.g., the token containing the private key has been lost or stolen). |
| | | | |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535g38g09.jpg)
| | PUBLIC | | 3 |
The goal of this report is to share relevant information with DigiNotar stakeholders (such as the Dutch Government and the Internet community), based on which they can make their own risk analysis. Because this is a public report, some investigation results and details cannot be included for privacy and/or security reasons.
Since the investigation has been more of a fact finding mission thus far, we will not draw any conclusions with regards to the network-setup and the security management system. In this report we will not give any advice to improve the technical infrastructure for the long term. Our role is to investigate the incident and give a summary of our findings until now. We leave it to the reader in general and other responsible parties in the PKI- and internet community to draw conclusions, based on these findings. We make a general reservation, as our investigations are still on going.
| | | | |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535g38g09.jpg)
| | PUBLIC | | 4 |
Some investigations were conducted before we started.
Fox-IT was given access to a report produced by another IT-security firm which performs the regular penetration testing and auditing for DigiNotar. The main conclusions from this report dated July 27thwere:
A number of servers were compromised. The hackers have obtained administrative rights to the outside webservers, the CA server “Relaties-CA” and also to “Public-CA”. Traces of hacker activity started on June 17th and ended on July 22nd.
Furthermore, staff from DigiNotar and the parent company Vasco performed their own security investigation. E-mail communication and memos with further information were handed over to us.
This information gave us a rough overview of what happened:
| • | | The signing of 128 rogue certificates was detected on July 19th during the daily routine security check. These certificates were revoked immediately; |
| • | | During analysis on July 20th the generation of another 129 certificates was detected. These were also revoked on July 21th; |
| • | | Various security measures on infrastructure, system monitoring and OCSP validation have been taken immediately to prevent further attacks. |
| • | | More fraudulent issued certificates were discovered during the investigation and 75 more certificates were revoked on July 27th. |
| • | | On July 29th a *.google.com certificate issued was discovered that was not revoked before. This certificate was revoked on July 29th. |
| • | | DigiNotar found evidence on July 28th that rogue certificates were verified by internet addresses originating from Iran. |
On August 30th Fox-IT was asked investigate the incident and recommend and implement new security measures. Fox-IT installed a specialized incident response network sensor to assist in the investigation. Furthermore we created images of several other servers.
The rogue certificate found by Google was issued by the DigiNotar Public CA 2025. The serial number of the certificate was, however, not found in the CA system’s records. This leads to the conclusion that it is unknown how many certificates were issued without any record present. In order to identify these unknown certificates and to prevent them from being used by victims, the OCSP responder2 requests were monitored.
Current browsers perform an OCSP check as soon as the browser connects to an SSL protected website through the https-protocol3. The serial number of the certificate presented by the website a user visits is send to the issuing CA OCSP-responder. The OCSP-responder can only answer either with ‘good’, ‘revoked’ or ‘unknown’. If a certificate serial number is presented to the OCSP-responder and no record of this serial is found, the normal OCSP-responder answer would be ‘good’4. The OCSP-responder answer ‘revoked’ is only returned when the serial is revoked by the CA. In order to prevent misuse of the unknown issued serials the OCSP-responder of DigiNotar has been set to answer ‘revoked’ when presented any unknown certificate serial it has authority over. This was done on September 1st.
The incident response sensor immediately informs if a serial number of a known fraudulently issued certificate is being misused. Also, all unknown serial number requests can be analysed and used in the investigation. All large number of requests to a single serial number is suspicious and will be detected.
2 | TheOnline Certificate Status Protocol(OCSP) is an Internet protocolused for obtaining the revocation status of an X.509 digital certificate. |
3 | Other applications using certificates can also use the OCSP verification method. |
4 | According to the RFC2560 |
| | | | |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535g38g09.jpg)
| | PUBLIC | | 5 |
Note that advanced methods for misusing the rogue certificates are possible by which a thorough attacker can circumvent our detection method.
The incident response sensor logged all network traffic since August 30th. Current analyses still show hacking attempts on the web server originating from Iran. During monitoring, we also saw unusual traffic after the company F-Secure announced its findings of a possible earlier breach of the website.5 We haven’t investigated this breach yet in detail. In August, DigiNotar installed a new web server. It’s fair to assume these hacker traces where copied from the previous web server install.
2.3 | CA servers investigation |
DigiNotar hosts several CA services on different servers. Earlier reports indicated two of these servers where compromised and misused by the attacker(s). It was essential to verify the status of the other CA systems and investigate if they were compromised or misused. Forensic disk images were made of all the CA servers for investigation.
Because of security implications, the details of these results are not shared in this public report. More generally, we found traces of hacker activity with administrator rights on the Qualified and PKIoverheid CA server as well as on other CA servers. Furthermore, we can share that on September 3rd more rogue certificates were discovered. The list of certificates is in the Annex 5.1.
The log files on the Qualified & PKI Overheid CA server do not show traces of deleted entries. These traces are present on other CA servers, where rogue certificates were produced. During further investigation however, we encountered several serial numbers of certificates that cannot be related to trusted certificates. Two of these were found on the Qualified & PKI Overheid CA server. It might be possible that these serial numbers have been temporarily generated by the CA software without being used. Alternatively, these serials were generated as a result of a bug of the software. However, we cannot rule out the possibility that these serial numbers relate to rogue certificates. Further investigation needs to be done to confirm or contradict this. The list of serials is in the Annex 5.2; this list has been communicated with the web browser vendors.
2.4 | Firewall investigation |
The firewall log files have not been analysed yet.
2.5 | Malicious software analyses |
A number of malicious/hacker software tools was found. These vary from commonly used tools such a the famous Cain & Abel tool6 to tailor made software.
Specifically developed software probably enabled the hackers to upload the generated certificates to a dropbox. Both the IP-addresses of an internal DigiNotar server and the IP-address of the dropbox were hardcoded in the software. Possibilities are being explored to investigate this server, as (parts of) the uploaded rogue certificates might be still available there.
A script was found on CA server public 2025. The script was written in a special scripting language only used to develop PKI software. The purpose of the script was to generate signatures by the CA for certificates which have been requested before. The script also contains English language which you can find in Annex 5.3. In the text the hacker left his fingerprint:Janam Fadaye Rahbar7.The same text was found in the Comodo hack in March of this year8. This breach also resulted in the generation of rogue certificates.
5 | The IT-Security company F-Secure blogs about a breach of the webserver of DigiNotar in May 2009. |
http://www.f-secure.com/weblog/archives/00002228.html
6 | Cain&Abel is a very powerful hackers toolkit. It’s capable of sniffing and breaking passwords. Most anti-virus software will detect C&A and flag is as malicious. |
7 | Supposedly meaning: “I will sacrifice my soul for my leader” |
8 | http://www.wired.com/threatlevel/2011/03/comodo_hack/ |
| | | | |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535g38g09.jpg)
| | PUBLIC | | 6 |
3.1 | Fraudulent issued certificates |
In total 531 fraudulent certificates have been issued. We have no indication that more certificate were issued by the attacker(s). 344 Of these contain a domain name in the common name. 187 Certificates have in the common name ‘Root CA’. We have reason to believe these certificates are not real CA certificates but normal end user certificates.
The attacker(s) had acquired the domain administrator rights. Because all CA servers were members of the same Windows domain, the attacker had administrative access to all of them. Due to the limited time of the ongoing investigation we were unable to determine whether all CA servers were used by the attacker(s). Evidence was found that the following CAsweremisused by the attacker(s):
| • | | DigiNotar Extended Validation CA |
| • | | DigiNotar Public CA - G2 |
| • | | DigiNotar Public CA 2025 |
| • | | Koninklijke Notariele Beroepsorganisatie CA |
The security of the following CAs was compromised, but no evidence of misuse was found (this list is incomplete):
| • | | Algemene Relatie Services System CA |
| • | | DigiNotar PKIoverheid CA Organisatie - G2 |
| • | | DigiNotar PKIoverheid CA Overheid en Bedrijven |
| • | | DigiNotar Root CA Administrative CA |
| • | | DigiNotar Root CA System CA |
| • | | DigiNotar Services 1024 CA |
| • | | MinIenM Autonome Apparaten CA - G2 |
| • | | MinIenM Organisatie CA - G2 |
| • | | Ministerie van Justitie JEP1 CA |
| • | | Nederlandse Orde van Advocaten - Dutch Bar Association |
| • | | Orde van Advocaten SubCA Administrative CA |
| • | | Orde van Advocaten SubCA System CA |
| • | | Renault Nissan Nederland CA |
| • | | TRIAL DigiNotar PKIoverheid Organisatie TEST CA - G2 |
For some of these CAs extra security measures were in place (like the CCV CA). This makes it more unlikely they were misused.
We investigated the OCSP responder log files around the time of the *.google.com incident. That incident was detected on August 27th. The first known public mention was a posting in agoogle forum. The user (from Iran) was warned by the Google Chrome browser that there was something wrong with the certificate. The corresponding roguecertificatewas created on July 10th.
| | | | |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535g38g09.jpg)
| | PUBLIC | | 7 |
Based on the logging mentioned above from the OCSP responder, we were able to extract the following information. On August 4th the number of request rose quickly until the certificate was revoked on August 29th at 19:09. Around 300.000 unique requesting IPs to google.com have been identified. Of these IPs >99% originated from Iran, as illustrated in figure 1.9
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535img003.jpg)
A sample of the IP’s outside of Iran showed mainly to be TOR-exit nodes, proxies and other (VPN) servers, and almost no direct subscribers.
The list of IP-addresses will be handed over to Google. Google can inform their users that during this period their e-mail might have been intercepted. Not only the e-mail itself but also a login cookie could have been intercepted. Using this cookie the hacker is able to log in directly to the Gmail mailbox of the victim and also read the stored e-mails. Besides that, he is able to log in all other services Google offers to users like stored location information from Latitude or documents in GoogleDocs. Once the hacker is able to receive his targets’ e-mail he is also able to reset passwords of others services like Facebook and Twitter using the lost password button. The login cookie stays valid for a longer period. It would be wise for all users in Iran to at least logout and login but even better change passwords.
Other OSCP request logs show some activity on August the 30th with a misused *.torproject.org certificate. None of these originated from Iran. However this does not prove that rogue certificates weren’t abused between the issue date and revocation date of the certificates based on the OCSP logs because some applications might not use the OCSP protocol for revocation checking.
9 | This static image shows all IP-addresses detected. Onhttp://www.youtube.com/watch?v=_eIbNWUyJWQ you can see the interception of Google users taking place in a timeline. |
| | | | |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535g38g09.jpg)
| | PUBLIC | | 8 |
4.1 | Skills and goal of the hackers |
We found that the hackers were active for a longer period of time. They used both known hacker tools as well as software and scripts developed specifically for this task. Some of the software gives an amateurish impression, while some scripts, on the other hand, are very advanced. In at least one script, fingerprints from the hacker are left on purpose, which were also found in the Comodo breach investigation of March 2011. Parts of the log files, which would reveal more about the creation of the signatures, have been deleted.
The list of domains and the fact that 99% of the users are in Iran suggest that the objective of the hackers is to intercept private communications in Iran.
4.2 | Other possible rogue certificates |
Using the OCSP responder requests we verify if the requested serial belongs to a known certificate. We have seen requests for unknown serials that cannot be matched against a known certificate. It’s possible that these serials belong to a “rogue” certificate or are just bogus OCSP requests, for instance done by security researchers. It’s still possible other unknown10 rogue certificates have been produced.
OCSP logging could still catch other possible rogue certificates based on the number of requests for an unknown serial, although It’s difficult to match the common name with that serial if the certificate in question is not known.
4.3 | Trust in the PKIoverheid and Qualified environment |
Although all CA-servers have been accessed by a hacker with full administrative access rights and attempts have been made to use the running PKI-software we have no proof of generated rogue Qualified or PKIoverheid certificates. The log files of these CA-Servers validate as correct and no deleted log files have been found on these CA-servers. This is in contrast to our findings on the other breached CA servers.
Investigators encountered two (2) serial numbers of certificates on the Qualified or PKIoverheid server that cannot be related to trusted certificates11. Based on this, we cannot rule out the possibility that these relate to rogue certificates.
4.4 | Current network infrastructure at DigiNotar |
The successful hack implies that the current network setup and / or procedures at DigiNotar are not sufficiently secure to prevent this kind of attack.
The most critical servers contain malicious software that can normally be detected by anti-virus software. The separation of critical components was not functioning or was not in place. We have strong indications that the CA-servers, although physically very securely placed in a tempest proof environment, were accessible over the network from the management LAN.
The network has been severely breached. All CA servers were members of one Windows domain, which made it possible to access them all using one obtained user/password combination. The password was not very strong and could easily be brute-forced.
The software installed on the public web servers was outdated and not patched.
No antivirus protection was present on the investigated servers.
An intrusion prevention system is operational. It is not clear at the moment why it didn’t block some of the outside web server attacks. No secure central network logging is in place.
10 | Unknown as in, that we haven’t been able to revoke them yet because we don’t know their existence. |
11 | OCSP requests to these serial numbers will result in a ‘revoke’ reply. |
| | | | |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535g38g09.jpg)
| | PUBLIC | | 9 |
5.1 | Fraudulent issued certificates |
The following list of Common Names in certificates are presumed to be generated by the attacker(s):
| | | | |
Common Name | | Number of certs issued | |
CN=*.*.com | | | 1 | |
CN=*.*.org | | | 1 | |
CN=*.10million.org | | | 2 | |
CN=*.JanamFadayeRahbar.com | | | 1 | |
CN=*.RamzShekaneBozorg.com | | | 1 | |
CN=*.SahebeDonyayeDigital.com | | | 1 | |
CN=*.android.com | | | 1 | |
CN=*.aol.com | | | 1 | |
CN=*.azadegi.com | | | 1 | |
CN=*.balatarin.com | | | 3 | |
CN=*.comodo.com | | | 3 | |
CN=*.digicert.com | | | 2 | |
CN=*.globalsign.com | | | 7 | |
CN=*.google.com | | | 26 | |
CN=*.logmein.com | | | 1 | |
CN=*.microsoft.com | | | 3 | |
CN=*.mossad.gov.il | | | 2 | |
CN=*.mozilla.org | | | 1 | |
CN=*.skype.com | | | 22 | |
CN=*.startssl.com | | | 1 | |
CN=*.thawte.com | | | 6 | |
CN=*.torproject.org | | | 14 | |
CN=*.walla.co.il | | | 2 | |
CN=*.windowsupdate.com | | | 3 | |
CN=*.wordpress.com | | | 14 | |
CN=Comodo Root CA | | | 20 | |
CN=CyberTrust Root CA | | | 20 | |
| | | | |
CN=DigiCert Root CA | | | 21 | |
CN=Equifax Root CA | | | 40 | |
CN=GlobalSign Root CA | | | 20 | |
CN=Thawte Root CA | | | 45 | |
CN=VeriSign Root CA | | | 21 | |
CN=addons.mozilla.org | | | 17 | |
CN=azadegi.com | | | 16 | |
CN=friends.walla.co.il | | | 8 | |
CN=login.live.com | | | 17 | |
CN=login.yahoo.com | | | 19 | |
CN=my.screenname.aol.com | | | 1 | |
CN=secure.logmein.com | | | 17 | |
CN=twitter.com | | | 19 | |
CN=wordpress.com | | | 12 | |
CN=www.10million.org | | | 8 | |
CN=www.Equifax.com | | | 1 | |
CN=www.balatarin.com | | | 16 | |
CN=www.cia.gov | | | 25 | |
CN=www.cybertrust.com | | | 1 | |
CN=www.facebook.com | | | 14 | |
CN=www.globalsign.com | | | 1 | |
CN=www.google.com | | | 12 | |
CN=www.hamdami.com | | | 1 | |
CN=www.mossad.gov.il | | | 5 | |
CN=www.sis.gov.uk | | | 10 | |
CN=www.update.microsoft.com | | | 4 | |
| | | | |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535g38g09.jpg)
| | PUBLIC | | 10 |
5.2 | Unknown serial numbers |
Root-CA server
On the ‘Root-CA’ server the following serials were encountered:
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535img004.jpg)
Qualified-CA server
On the ‘Qualified-CA’ server the following serials were encountered:
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535img005.jpg)
These serials might have been issued by the following CAs:
| • | | DigiNotar PKIoverheid CA Organisatie - G2 |
| • | | DigiNotar Qualified CA System CA |
| • | | DigiNotar Qualified CA Administrative CA |
| • | | TRIAL DigiNotar PKIoverheid Organisatie TEST CA G2 |
| • | | TRIAL DigiNotar PKIoverheid Organisatie TEST CA - G2 |
| • | | DigiNotar PKIoverheid CA Overheid en Bedrijven |
‘Taxi-CA
On the ‘Taxi-CA’ server the following serials were encountered:
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535img006.jpg)
‘Public-CA server
On the ‘Public-CA’ server the following serials were encountered:
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535img007.jpg)
| | | | |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535g38g09.jpg)
| | PUBLIC | | 11 |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535img008.jpg)
These serials might have been issued by the following CAs (list incomplete):
| • | | Algemene Relatie Services System CA |
| • | | DigiNotar Extended Validation CA |
| • | | DigiNotar PKIoverheid CA Organisatie - G2 |
| • | | DigiNotar PKIoverheid CA Overheid en Bedrijven |
| • | | DigiNotar Public CA - G2 |
| • | | DigiNotar Public CA 2025 |
| • | | DigiNotar Qualified CA Administrative CA |
| • | | DigiNotar Qualified CA System CA |
| • | | DigiNotar Root CA Administrative CA |
| • | | DigiNotar Root CA System CA |
| • | | DigiNotar Services 1024 CA |
| • | | Koninklijke Notariele Beroepsorganisatie CA |
| • | | MinIenM Autonome Apparaten CA - G2 |
| • | | MinIenM Organisatie CA - G2 |
| • | | Ministerie van Justitie JEP1 CA |
| • | | Nederlandse Orde van Advocaten - Dutch Bar Association |
| | | | |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535g38g09.jpg)
| | PUBLIC | | 12 |
| • | | Orde van Advocaten SubCA Administrative CA |
| • | | Orde van Advocaten SubCA System CA |
| • | | Renault Nissan Nederland CA |
| • | | TRIAL DigiNotar PKIoverheid Organisatie TEST CA - G2 |
| • | | TRIAL DigiNotar PKIoverheid Organisatie TEST CA G2 |
5.3 | Plain text left in script to generate signatures on rogue certificates |
| 3 | I know you are shocked of my skills, how i got access to your network |
| 4 | to your internal network from outside |
| 5 | how I got full control on your domain controller |
| 6 | how I got logged in into this computer |
| 7 | HOW I LEARNED XUDA PROGRAMMING |
| 8 | HOW I got this IDEA to write such XUDA code |
| 9 | How I was sure it’s going to work? |
| 10 | How i bypassed your expensive firewall, routers, NetHSM, unbreakable hardware keys |
| 11 | How I did all xUDA programming without 1 line of resource, got this idea, owned your network accesses your domain controlled, got all your passwords, signed my certificates and received them shortly |
| 12 | THERE IS NO ANY HARDWARE OR SOFTWARE IN THIS WORLD EXISTS WHICH COULD STOP MY HEAVY ATTACKS |
| 13 | MY BRAIN OR MY SKILLS OR MY WILL OR MY EXPERTISE |
| 14 | That’s all ok! Everything I do is out of imagination of people in world |
| 15 | I know you’ll see this message when it is too late, sorry for that |
| 16 | I know it’s not something you or any one in this world have thought about |
| 17 | But everything is not what you see in material world, when God wants something to happen |
| 20 | My signature as always: Janam Fadaye Rahbar |
| 23 | Rahbare azizam mesle hamishe asoode bash, ta vaghti ke man va amsale man baraye in marzo boom |
| 24 | va baraye barafrashte negah dashtane parchame velayate faghih kar mikonand |
| 25 | daste har doshmano mozdouri ghat khahad bood |
| 26 | Rahbaram, Tamame vojoodam fadaye to ke ham jani o ham janani |
| | |
06-Jun-2011 | | Possibly first exploration by the attacker(s) |
17-Jun-2011 | | Servers in the DMZ in control of the attacker(s) |
19-Jun-2011 | | Incident detected by DigiNotar by daily audit procedure |
02-Jul-2011 | | First attempt creating a rogue certificate |
10-Jul-2011 | | The first succeeded rogue certificate (*.Google.com) |
20-Jul-2011 | | Last known succeeded rogue certificate was created |
22-Jul-2011 | | Last outbound traffic to attacker(s) IP (not confirmed) |
22-Jul-2011 | | Start investigation by IT-security firm (not confirmed) |
27-Jul-2011 | | Delivery of security report of IT-security firm |
27-Jul-2011 | | First rogue *.google.com OSCP request |
28-Jul-2011 | | First seen that rogue certificates were verified from Iran |
04-Aug-2011 | | Start massive activity of *.google.com on OCSP responder |
27-Aug-2011 | | First mention of *.google.com certificate in blog |
29-Aug-2011 | | GOVCERT.NL is notified by CERT-BUND |
29-Aug-2011 | | The *.google.com certificate is revoked |
30-Aug-2011 | | Start investigation by Fox-IT |
30-Aug-2011 | | Incident response sensor active |
01-Sep-2011 | | OSCP based on white list |
| | | | |
![LOGO](https://capedge.com/proxy/8-K/0001193125-11-241796/g228535g38g09.jpg)
| | PUBLIC | | 13 |