The Forrester Wave™: Digital Risk Monitoring, Q3 2016 named RiskIQ a leader in Digital Risk Monitoring, and gave RiskIQ top ranking for Current Offering & Data Coverage.
Download the Report
IDG Connect: 2017 State of Enterprise Digital Defense Report
Findings quantify the security management gap and business impact of external web, social, and mobile threats.
Get the Research Report
RiskIQ Digital Threat Management Platform Datasheet
Learn about our platform and products.
Read the Datasheet
Digital Threat Management – Mitigating External Web, Social and Mobile Threats
Learn more about digital defense and security outside the firewall as explained by Scott Gordon, CISSP.
Watch the Video
Rackspace Accelerates External Digital Threat Investigation with RiskIQ PassiveTotal
Download Case Study
EMA Radar™ Q4 2017 Report
RiskIQ ranked a technology and value leader in digital threat intelligence management.
Get the Analyst Report
July 17, 2017, Andrew Geiger
Just how secure is the data that you are entering on any given website?
Unfortunately, this question is taken for granted by many internet users, resulting in undesirable consequences like theft of sensitive data, for which the organization responsible for the insecure site is culpable. All too often organizations have expired SSL certificates existing on their web assets, which can be hazardous to those visiting their sites, and therefore, hazardous to their businesses.
Back in May, I posted a blog highlighting the prevalence of insecure web forms that RiskIQ identified across our customers’ assets, and what the data uncovered was interesting, to say the least. Much of the guidance we offered in that post also applies to broken SSL certs, and in this blog, I’ll discuss expired SSL certs relative to the web compliance of RiskIQ customers.
‘SSL’ has become an umbrella term that is used to describe both the original SSL, or Secure Sockets Layer encryption method, and the newer, more secure Transport Sockets Layer, or TLS method. Mostly, when people refer to ‘SSL,’ they just mean establishing a secure, encrypted connection between a web server and a client. At their basis, SSL certs are powerful security measures that, for the most part, protect against threats on insecure networks, such as man-in-the-middle attacks.
SSL certs make use of various types of symmetric and asymmetric encryption algorithms when sending information between a web server and a client in a process known as the ‘SSL handshake.’ The SSL handshake occurs on top of the Transmission Control Protocol layer (TCP) and involves an exchange of public (and sometimes private) keys between the server and the client or the server and another server, resulting in a secured connection. Once the handshake is established, a client’s browser will visually display a URL as ‘HTTPS.’
Fig-1 Chrome Expired SSL Certificate Warning
Not all SSL Certificates are Equal
You now know that SSL certs can have different means of encryption, but they also have different authentications for website owners. Certificate Authorities (CAs) such as Symantec offer varying degrees of SSL authentication that include Domain Validation, Organizational Validation, and Extended Validation, each requiring increasing levels of security measures to register. Extended Validation authentication contains the most advanced security measures, making it most formidable against false registrations and phishing attacks.
But just how secure is any particular SSL certification? Well, that depends. A newer, more secure TLS cert, for example, may still use weak or outdated algorithms and hashes such as a SHA-1. Recently, my colleague used Chrome dev tools to inspect the SSL cert on his personal bank’s website (Fig. 2) and found a newer TLS certificate that was running an old RSA algorithm with an obsolete SHA-1 hash:
Fig-2 Bank Website’s SSL Certificate in Chrome
Google, along with Microsoft and Mozilla, have all publicly announced plans to disable support for certificates using outdated SHA-1 hashes. Even more recently, it was announced that security researchers at Google have even broken the dated SHA-1 encryption. The consensus is that SSL certificates should be using the most current and up-to-date algorithms/key exchanges to guard against threat actors adequately.
I decided to examine data from ten of our Digital Footprint customers who also happen to be large financial institutions. While there was variation in the size of each digital footprint, all ten customers had noticeable security flaws related to their assets having either expired SSL Certificates or using obsolete SHA-1 hashes. On average, each customer had roughly 38 assets using expired SSL Certificates, with one outlier. Furthermore, each customer also had approximately 15 assets using SHA-1 hashes, except two, which had none:
Fig-3 SSL Issues in Customers’ Digital Footprint
For some organizations, SSL Certification is basic internet security. However, at times, cataloging known web assets and certificate types and statuses it can be a daunting task. To help, RiskIQ’s Digital Footprint offers easy and simple solutions to these problems with large queryable data sets, including potentially unknown or forgotten web assets.
EDF offers continuous monitoring of these web assets to highlight compromised web infrastructure and web compliance issues such as expired SSL certificates and the use of now obsolete SHA-1 certs. Furthermore, notifications are sent to our Digital Footprint customers whose certifications are set to expire at both the 90 and 60-day marks so that they may be addressed before they become a critical security issue. SSL Certifications are the first line of defense against external threat actors and, as such, should always be appropriately updated and configured.