Another Dutch certificate authority halts business

Another Dutch-based SSL certificate authority has stopped issuing credentials following a security incident.

KPN Corporate Market, one of the Netherlands largest telecommunications and IT service providers, announced Friday in a news release (translated) that it has temporarily halted the issuance of certificates, pending an additional investigation. Already issued certs, however, remain valid.

A recent examination of a web server turned up "abuse" that may have happened up to four years ago, the company said. Hackers may have wanted to use the server to launch distributed denial-of-service attacks against their targets.

Even though KPN is unaware of any fraudulent certificates being issued as a result of the possible breach, the company appears to be taking no chances, especially in light of the DigiNotar collapse.

Also based in the Netherlands, DigiNotar, which is owned by U.S.-based Vasco, was responsible for issuing hundreds of phony credentials after a hacker breached its infrastructure. DigiNotar went bankrupt after reports emerged in August that it had issued a fake SSL certificate for Google, which appeared in the wild, presumably so Iranian users could be spied on.

In response to the incident, KPN has replaced the affected web servers. The company plans to conduct an investigation to determine that it meets all "required safeguards, procedures and rules applicable to the issue of internet safety certificates."

Kaspersky Lab senior virus analyst Roel Schouwenberg said he expects more certificate authorities to discover similar breaches and that it is unlikely anything major happened.

"If something had truly gone wrong, we would have all noticed it by now, wouldn't we?" he asked in a Friday blog post.

Sign up to our newsletters

More in News

House Intelligence Committee OKs amended version of controversial CISPA

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.

Three LulzSec members plead guilty in London

Ryan Ackroyd, 26; Jake Davis, 20; and Mustafa al-Bassam, 18, who was not named until now because of his age, all admitted their involvement in the hacktivist gang's attack spree.