Home / Professional / Professional Featured / Certificates stolen from D-Link used to sign malware

Certificates stolen from D-Link used to sign malware

Taiwanese companies are very much targeted when it comes to cyber espionage. For the past decade, there have been stories of Taiwanese companies having their certificates stolen and used to sign various bits of malware. D-Link is the next company to be affected, as they have had certificates stolen and used in password-stealing malware.

Both D-Link and Changing Information Technology were victims of a hack. It is thought that a hacking group by the name of ‘BlackTech' was behind the theft, the certificates were then used to sign at least two pieces of malware, according to antivirus provider, Eset.

The first piece of malware was a remotely controlled backdoor, while the other was designed to steal passwords. Eset believes the group behind the hack is highly skilled, as two fairly high profile companies were successfully targeted.

As reported by Arstechnica, the certificates in question have since been revoked. D-Link in particular says that customers should not be affected by this. Some IP cameras will show a certificate warning. D-Link says that this can be safely ignored, but we would recommend exercising caution and not ignoring warnings, especially when cameras are involved.

KitGuru Says: Taiwanese companies will have to step their game up with such an active and skilled hacking group located close to home. Have you been affected by this hack?

Become a Patron!

Check Also

Marvel Rivals has a major security issue enabling Remote Code Execution

A Remote Code Execution exploit has been discovered in Marvel Rivals, allowing hackers to remotely spread malware through the game.

We've noticed that you are using an ad blocker.

Thank you for visiting KitGuru. Our news and reviews teams work hard to bring you the latest stories and finest, in-depth analysis.

We want to be as informative as possible – and to help our readers make the best buying decisions. The mechanism we use to run our business and pay some of the best journalists in the world, is advertising.

If you want to support KitGuru, then please add www.kitguru.net to your ad blocking whitelist or disable your adblocking software. It really makes a difference and allows us to continue creating the kind of content you really want to read.

It is important you know that we don’t run pop ups, pop unders, audio ads, code tracking ads or anything else that would interfere with the KitGuru experience. Adblockers can actually block some of our free content, such as galleries!