Certificates employed in malware campaign

Certificates employed in malware campaign

Cyber criminals are using free certificates in order to conduct malvertising attacks, says a recent Trend Micro report.

Encryption expert Let’s Encrypt has seen its charity been subject to abuse, with hackers employing this latest tactic to trick unsuspecting users.

Trend Micro identified malicious websites using a Let’s Encrypt certificate in December, with web traffic coming from Japan. Micro believes that the con is only a part of a larger one that it discovered in September, where 3,000 websites in Japan were affected and close to 500,000 users were subjected to the campaign.

This particular con results in the users being a victim of the Angler Exploit Kit, well-known malware named after an ugly fish.

Trend Micro I.T. security consultant Bharat Mistry told SCMagazineUK.com how the  certificates could be distributed while undetected. Mistry said:

“The hackers created a sub-domain for which they requested a new Lets Encrypt certificate – and because there is no stringent checking of the certificate requester, Lets Encrypt has generated and supplied a new certificate.”

The subdomain certificate is then employed in encrypting any traffic between the online user and the ad.

Both individual users and businesses need to be savvier in the current climate where we are seeing more advanced campaigns attempting to mislead users. Businesses, at least, are in a position to do more about it by posting information security jobs to professionals trained in recognising and combatting such attacks. With many firms maintaining large files of user data, they would be encouraged to take such action.

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • RANT Events
  • Bloom Nepro
  • YPO
  • Crown Commerical Service
  • Disability Confident
  • ISO 9001
  • Armed Force Covenant
  • Cyber Essentials Plus
  • ISO 27001





Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?


Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you


Thank you for successfully uploading your CV.

Acumin Alerts


Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.



Thank you for submitting your vacancy.


Create an account to register your contact details, sign up for job alerts and upload your CV


Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management

Submit a Vacancy

Use the form below to submit a vacancy