Author Topic: Let's encrypt certstream abuse often not detected...  (Read 933 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast √úberevangelist
  • Probably Bot
  • *****
  • Posts: 33926
  • malware fighter
Let's encrypt certstream abuse often not detected...
« on: January 27, 2023, 10:45:43 AM »
Widespread malicious pre-cert Let's Encrypt cert.chain abuse taking place.

Just a random example:
Also see:

Not to say there are website certified there, that are well above board in these respects. :)

This particular cert. chaining abuse has been described here:

Also Ahnlab described it as with:

Hope avast will also flag this kind of pre-chain certstream abuse (use CaliDog to detect).

Wonder whether the sponsors of letsencrypt dot org know,
where part of their money now goes to waste?

Source: luntrus, Bleeping Computer, etc.

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!