For decades, code signing has been used to verify the integrity of software.
Nearly every organization relies on it to confirm their code is authentic and has not been corrupted with malware. As the scope of development accelerates, modern organizations often struggle to secure and protect code signing operations. Unfortunately, bad actors are eager to take advantage of this lack of protection.
In April, security researchers uncovered Scranos, rootkit malware that was signed with a stolen certificate. A month later, Chronicle Security published a detailed report on how abused code signing certificates were used to upload malware to VirusTool. Sadly, these incidents are not unique, from PortSmash to ShadowHammer. Cyber criminals understand the value that falsified legitimacy code signing can bring to their campaigns.
“Today, every organization is a software developer building apps, libraries, containers and other tools,” said Kevin Bocek, vice president of security strategy and threat intelligence for Venafi. “However, it can be very difficult to scale code signing operations. The security procedures that protect code signing are typically seen as cumbersome, and developers often ignore them.”
"Bad actors understand the power of code signing"
APT41 Perfects Code Signing Abuse to Escalate Supply Chain Attacks
“This leaves security teams in the dark and it’s very advantageous for bad actors because they understand the power and value of code signing,” Kevin continued. “From Stuxnet to everyday malware and phishing campaigns, attacks that leverage code signing evade next-generation AV detection. Stolen code signing keys are powerful cyber weapons that put companies and their customers at risk.”
In order to address these issues, Venafi recently debuted CodeSign Protect, a machine identity management solution that secures code signing processes by delivering enterprise wide visibility into all code signing operations. CodeSign Protect provides centralized private key storage, code signing policy enforcement, and automation while reducing code signing burden on software development teams.
Key benefits of CodeSign Protect include:
- Scalability that can support a few developers in one location to tens of thousands of developers distributed globally, and millions of code signing operations a week.
- Automation and support for a broad range of software development processes; development teams do not need to change tools.
- A central, permanent storage location for private keys so they remain protected.
- Flexible, customizable policy enforcement that supports the needs of multiple software projects, including the approval of workflows, certificate types, certificate authorities, HSMs and software development tool sets.
- Allows security teams to provide a code signing service that enforces policies and is transparent to developers.
In addition to securing enterprise code signing processes, Next-Gen Code Signing automates the management of all code signing private keys. Private code signing keys never leave the trusted Venafi storage platform or connected hardware security modules (HSMs). This new solution provides information security teams with comprehensive visibility and detailed intelligence about all aspects of code signing operations, including who signed the code and with which certificate, as well as who approved the request and when each action occurred. Using the intelligence gathered from code signing processes, Next-Gen Code Signing delivers compliance and audit reporting across all code signing activities.
"Next-Gen Code Signing automates the management of all code signing private keys"
“Next-Gen Code Signing lets software developers use the same code signing tools and does not require changes to their build environments” Bocek concludes. “It provides an invisible layer of technology that keeps code signing keys safe and out of the hands of attackers. Venafi Next-Gen Code Signing gives security teams and developers an exciting way to be both fast and safe.”
Get Fast, Easy, and Secure Enterprise-Grade Code Signing With Venafi!
Related posts
- The Problem with Code Signing Private Key Sprawl
- Code Signing Credentials Are Machine Identities and Need to Be Protected
- 5 Best Practices to Secure Your Code Signing Process
- Top 5 Indicators that Your Company Might Have a Code Signing Problem
- Study: How Well Are You Protecting Code Signing Certificates?