Breaking

NSA warns of wildcard certificates and steps for protection

The NSA has issued a warning against the usage of broadly-scoped certificates for multiple server authentication in any organization. A document was released last week with mitigation against the use of wildcard certificates as there is a new technique called ALPACA which could be used for traffic redirection attacks.

ALPACA the silent assassin

The NSA is warning about the dangers that come with wildcard certificates that validate and allow secure connection to Transport Layer Security Protocol. Researchers have shown that the wildcard certificates can be exploited through an application layer protocol content confusion attack, which was later named as ALPACA – Application Layer Protocols Allowing Cross-Protocol Attack and facilitates cookie hijacking or cross-site scripting attacks.

Wildcard and multi-domain certificates differ from one another, the former is used for sub-domains within a domain, while the latter goes for multiple individual domain under the same IP address. With ALPACA attackers can perform phishing, MITM, watering hole and malvertising attacks on businesses.

To prevent such attacks the private key of the wildcard certificate has to be protected and should be kept in a secured server.

Protecting your wildcard certificates

Organizations should ensure these certificates are used in the appropriate times and their scope should be well studied before using one. The storage location of the private keys has to be periodically tested and ensured of high security. Employing a gateway or firewall is better for enhanced protection and safety.

DNS encryption with validation for DNS security extensions can avoid users to land in a different or malicious location. Finally enabling ALPN and keeping your browsers updated can reduce the chances of becoming a victim to ALPACA influenced attacks.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago