All the latest UK technology news, reviews and analysis

Bit9 neglect left customers open to attack

09 Feb 2013
Hacker's hands on keyboard

Security firm Bit9 has blamed a breach of its own systems for an attack which left customers vulnerable to malware infections.

The company on Friday admitted that its own systems had been compromised and used to create a set of false security clearances which allowed attackers to bypass the Bit9 Application Whitelisting security tools.

According to Bit9, systems on the company's network had beeb breach by hackers, allowing them to classify their own malware payloads as permitted applications on the Bit9 platform.

The attackers were then able to install the malware on the networks of third-party firms without triggering the Bit9 protections.

"Due to an operational oversight within Bit9, we failed to install our own product on a handful of computers within our network," Bit9 chief executive Patrick Morley said in a company blog post on the matter.

"As a result, a malicious third party was able to illegally gain temporary access to one of our digital code-signing certificates that they then used to illegitimately sign malware."

Morley said that only a few customers were subject to the attack, the company has since remedied the issue and revoked the phoney certificates.

Security researcher Brian Krebs, who first broke word of the attack, noted that the incident was particularly painful for Bit9 given the company's emphasis on application whitelisting as a means for securing networks.

"There may be deep irony in this attack," Krebs wrote.

"While Bit9 has made a name for itself based on the reality that antivirus software cannot keep up with the tens of thousands of new malware variants being unleashed on the internet each day... there is a better than even chance that the malware signed with Bit9′s keys was first detected with traditional antivirus products."

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Shaun Nichols

Shaun Nichols is the US correspondent for He has been with the company since 2006, originally joining as a news intern at the site's San Francisco offices.

More on Security
What do you think?
blog comments powered by Disqus

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?

Popular Threads

Powered by Disqus
Galaxy S5 vs iPhone 5S vs Nexus 5 showdown

Galaxy S5 vs iPhone 5S vs Nexus 5

We speed test three of the most popular smartphones

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery


iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Software Development Engineer

Develop: Customise: Configure. Maximise your technical...

IT Systems Administrator

Abscissa.Com Limited trades as Jokers’ Masquerade, a...

PHP Team Lead

Holmes Media is seeking an experienced and highly motivated...

Network Engineer

Our Company: CGG ( is a fully...
To send to more than one email address, simply separate each address with a comma.