Back to PKI Disasters

DigiNotar 2011

The CA That Died in Six Weeks

A hacker breach, 531 fake certificates, 300,000 Iranians surveilled, and bankruptcy in 42 days.

2011BreachBankruptState-Sponsored
2011 Case Study20 min read
DigiNotar 2011: The CA That Died in Six Weeks - Timeline showing breach in July 2011, revocation in August 2011, and bankruptcy in September 2011

Quick Facts

CADigiNotar
Year2011
Attack TypeExternal breach via unpatched web server
Rogue Certificates531+ certificates including *.google.com
Human Impact~300,000 Iranians surveilled
Time to Distrust3 days after public disclosure
OutcomeBankrupt in 24 days
The LessonSecurity failures kill CAs. Browsers will pull the trigger.

The 30-Second Version

What: Hackers breached DigiNotar and issued 531+ fraudulent certificates, including for *.google.com
When: Breach in July 2011, discovered August 27, bankrupt September 20
Who was hurt: ~300,000 Iranian Gmail users subjected to government surveillance
Why it matters: First CA killed by browser distrust. Created Certificate Transparency. Proved browsers would pull the trigger.

How It Was Discovered

August 27, 2011 - An Iranian Gmail user named "alibo" posted on Google's product forum:

"I got this error today while I was trying to open my Gmail..."

— "alibo", Google Product Forums, August 2011

He included a screenshot showing Chrome warning about an invalid certificate for Google - issued by DigiNotar.

Chrome Was The Only Browser That Caught This

Google had implemented "certificate pinning" for their own domains - a new security feature that expected Google certificates to come from specific CAs. DigiNotar wasn't on that list.

Within 48 Hours

  • Google confirmed the certificate was fraudulent
  • Mozilla and Microsoft announced they would distrust DigiNotar
  • DigiNotar finally admitted to a breach they'd known about for 41 days

The Attack Timeline

DateEvent
June 17, 2011Attacker breaches DigiNotar via unpatched web server
July 10, 2011First rogue certificate issued (*.google.com)
July 19, 2011DigiNotar discovers breach internally
July 19 - Aug 27DigiNotar attempts to contain breach quietly - tells no one
Aug 27, 2011"alibo" posts on Gmail forum - breach becomes public
Aug 29, 2011Google/Mozilla announce distrust
Aug 30, 2011DigiNotar admits to breach (41 days after discovery)
Sep 3, 2011Dutch government takes control of DigiNotar
Sep 6, 2011Dutch government severs ties - tells citizens to use "pen and paper"
Sep 20, 2011DigiNotar files for bankruptcy

24 days

From public disclosure to bankruptcy

63 days

From breach discovery to bankruptcy

How The Breach Happened

The Attack Chain

1. INITIAL ACCESS
Unpatched DotNetNuke CMS on public web server
Known vulnerability (CVE not disclosed)
2. LATERAL MOVEMENT
Web server on same Windows domain as CA servers
Weak domain admin password: "Pr0d@dm1n"
Attacker gains domain administrator
3. FULL COMPROMISE
All 8 CA servers on same domain
Domain admin = access to everything
HSM keys left in "activated" state
Attacker can sign any certificate

What DigiNotar Had

  • HSMs (Hardware Security Modules)
  • Biometric access controls
  • Physical security (mantraps)
  • Network segmentation (supposedly)

What DigiNotar Failed At

  • Patching public-facing web servers
  • Strong passwords ("Pr0d@dm1n")
  • Real network segmentation
  • HSM key management
  • Log monitoring
  • Incident disclosure (41 days silent)

The HSM Problem

HSMs are supposed to protect private keys. But DigiNotar left their HSM keys in an "activated" state - meaning anyone with domain access could sign certificates without additional authentication.

"No records could be provided by DigiNotar regarding if and when smartcards were used to activate private keys"

— Fox-IT Investigation Report

CRLs (Certificate Revocation Lists) were being automatically signed during the intrusion - proving the keys were unlocked and ready to use.

The Scope: 531 Rogue Certificates

All eight CA servers were compromised. The attacker issued certificates for:

CategoryDomains
Email*.google.com, gmail.com, login.yahoo.com
Socialfacebook.com, twitter.com
Techmicrosoft.com, windowsupdate.com, mozilla.org, addons.mozilla.org
Privacytorproject.org, *.wordpress.com, skype.com
Intelligencecia.gov, mossad.gov.il, sis.gov.uk (MI6)
Other CAsthawte.com, verisign.com, comodo.com

Why Windows Update?

Could potentially push malicious "updates" to millions of computers.

Why Intelligence Agencies?

Intercept traffic from Iranians trying to contact Western intelligence services.

The Iranian Connection

Evidence Pointing to State-Sponsored Attack

1

300,000 OCSP Requests from Iranian IPs

DigiNotar logs showed massive certificate validation queries from Iran for the rogue Google certificate.

2

ISP-Level Interception Required

The MITM attack only works if you can redirect traffic. This requires ISP cooperation or control - something only a government can do.

3

Target Selection

Gmail (dissidents), Tor (anonymity), intelligence agencies (informants)

4

Attacker Signature

Same fingerprint as the Comodo breach earlier in 2011. That attacker claimed to be a 21-year-old Iranian.

How The MITM Attack Worked

NORMAL:
[Iranian user] → DNS → [Real Google IP] → [Real Gmail]
COMPROMISED:
[Iranian user] → [Iranian ISP DNS poisoned] → [Government proxy]
[Fake Google cert]
Intercept credentials
Forward to real Gmail

The user sees a valid HTTPS connection (green padlock). The government sees everything.

Chrome users were the only ones who got warnings - certificate pinning saved them.

The Human Cost

A Dutch MP stated that DigiNotar's delayed reporting "had put lives at risk."

Security researcher Mikko Hyppönen: "activists may have died as a consequence."

If the Iranian government identified dissidents through intercepted Gmail, those individuals faced imprisonment, torture, or death.

The Collapse

Why Browsers Had to Act

Once a CA is compromised, every certificate they've ever issued becomes suspect. There's no way to know which certificates are legitimate and which are fraudulent.

The only option: complete distrust.

Browser Responses

BrowserActionDate
ChromeBlocked DigiNotarAug 29
FirefoxEmergency update removing DigiNotarAug 30
MicrosoftRevoked DigiNotar trustAug 29
AppleRevoked in security updateSep 9

Dutch Government Chaos

DigiNotar was the CA for the Dutch government's PKIoverheid (government PKI). When browsers distrusted DigiNotar, government services broke.

September 6, 2011

Government announces citizens should use "pen and paper" for official communications while new certificates are deployed.

Bankruptcy

September 20, 2011

Parent company VASCO announces DigiNotar has filed for bankruptcy.

"The company has adopted the position that there is no realistic prospect for economic recovery of DigiNotar's enterprise."

The Lessons

1.HSMs Are Not Magic

DigiNotar had HSMs. The keys were still compromised because:

  • Keys were left in activated state
  • No audit trail of key usage
  • Network access = HSM access

HSMs protect against physical theft. They don't protect against authorized (or seemingly authorized) access.

2.Network Segmentation Must Be Real

DigiNotar's public web server was on the same Windows domain as their CA servers. One compromised server = all servers compromised.

CA infrastructure must be genuinely isolated, not just "on a different VLAN."

3.Patch Everything, Especially Public-Facing Systems

The breach started with an unpatched DotNetNuke installation. A known vulnerability with available patches.

Your security is only as strong as your weakest public-facing system.

4.Incident Response Includes Disclosure

DigiNotar knew about the breach for 41 days. They tried to handle it quietly. When the truth came out, trust was completely destroyed.

Delayed disclosure multiplies the damage. Transparency is mandatory.

5.Browser Vendors Will Pull the Trigger

Before DigiNotar, some questioned whether browsers would actually distrust a major CA. DigiNotar proved they would - and quickly.

No CA is too big to fail. Browser trust can be revoked.

The Legacy

DigiNotar's breach directly led to:

ChangeDescription
Certificate TransparencyPublic logs of all issued certificates, making rogue certs detectable
Certificate PinningBrowsers hardcode expected CAs for major sites
HPKPHTTP Public Key Pinning - site operators could pin their own certificates (later deprecated)
Stricter CA AuditsWebTrust and ETSI audits became more rigorous
Baseline RequirementsCA/Browser Forum formalized minimum security standards

Chrome's certificate pinning caught this attack. That feature only existed because Google engineers were paranoid about exactly this scenario. DigiNotar validated their paranoia.

DigiNotar vs. Other CA Failures

DigiNotar (2011)Symantec (2017)Entrust (2024)
CauseExternal breachInternal failuresCompliance refusal
Disclosure41 days hiddenGradual discoveryArgued publicly
Human Impact~300K surveilled, possible deathsBusiness disruptionBusiness disruption
Time to Distrust3 days2+ years (gradual)5 months
OutcomeBankrupt in 24 daysSold to DigiCertCA sold to Sectigo
LegacyCT, pinning, audit reformIndustry consolidation"Rules apply to everyone"

FAQ

Why didn't antivirus or security tools catch this?

The fraudulent certificates were technically valid - properly signed by a trusted CA. That's the whole point. Security tools trusted DigiNotar, so they trusted the certificates.

Could this happen today?

Certificate Transparency makes it much harder. Any certificate issued is logged publicly, so rogue certificates would be detected quickly. But a sophisticated attacker with CA access could still cause damage before detection.

Was anyone prosecuted?

The attacker was never caught. Dutch prosecutors investigated DigiNotar for criminal negligence but filed no charges. The investigation pointed to Iran, but no individuals were identified.

What happened to the Dutch government services?

Significant disruption for weeks. New certificates had to be issued from a different CA. At one point, citizens were told to use "pen and paper" for government interactions.

How many people were actually surveilled?

Unknown. The 300,000 figure comes from OCSP validation requests - meaning 300,000 Iranian connections validated the fake Google certificate. How many were actively monitored is unclear.

Resources