• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Saturday, February 7, 2026
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News Science

A Georgia State cybersecurity study of the dark web exposes vulnerability to machine identities

Bioengineer by Bioengineer
March 8, 2019
in Science
Reading Time: 2 mins read
0
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

A thriving marketplace for SSL and TLS certificates–small data files used to facilitate confidential communication between organizations’ servers and their clients’ computers–exists on a hidden part of the Internet, according to new research by Georgia State University’s Evidence-Based Cybersecurity Research Group (EBCS) and the University of Surrey.

Networked machines use keys and SSL/TLS certificates to identify and authenticate themselves when connecting to each other, much like humans employ user names and passwords to go online, according to VenafiĀ®, a privately held provider of machine identity protection and sponsor of the research.

When these certificates are sold on the darknet, they are packaged with a wide range of crimeware that delivers machine identities to cybercriminals who use them to spoof websites, eavesdrop on encrypted traffic, perform attacks and steal sensitive data, among other activities.

Uncovering the widespread availability of these certificates on the darknet was a surprise, according to lead author David Maimon, an associate professor in Georgia State’s Andrew Young School of Policy Studies and director of the EBCS. A search of five marketplaces in the darknet for this research uncovered 2,943 mentions for “SSL” and 75 for “TLS.” In comparison, there were just 531 mentions for “ransomware.”

“One very interesting aspect of this research was seeing TLS certificates packaged with wrap-around services–such as Web design services–to give attackers immediate access to high levels of online credibility and trust,” he said. “It was surprising to discover how easy and inexpensive it is to acquire extended validation certificates, along with all the documentation needed to create very credible shell companies without any verification information.”

“This study found clear evidence of the rampant sale of TLS certificates on the darknet,” said Kevin Bocek, vice president of security and threat intelligence for Venafi. “TLS certificates that act as trusted machine identities are clearly a key part of cybercriminal toolkits, just like bots, ransomware and spyware. Every organization should be concerned that the certificates used to establish and maintain trust and privacy on the Internet are being weaponized and sold as commodities to cybercriminals.”

###

For more information about Georgia State’s Evidence-based Cybersecurity Research Group, go to https://ebcs.gsu.edu.

Download a free copy of the report at https://ebcs.gsu.edu/download/ssl-tls-certificates-and-their-prevalence-on-the-dark-web/.

Media Contact
Jennifer French Giarratano
[email protected]
https://news.gsu.edu/2019/03/08/a-georgia-state-cybersecurity-study-of-the-dark-web-exposes-vulnerability-to-machine-identities/?utm_source=press-release&utm_medium=media&utm_campaign=cybersecurity

Tags: Computer ScienceSystem Security/HackersTechnology/Engineering/Computer Science
Share13Tweet8Share2ShareShareShare2

Related Posts

Five or more hours of smartphone usage per day may increase obesity

July 25, 2019
IMAGE

NASA’s terra satellite finds tropical storm 07W’s strength on the side

July 25, 2019

NASA finds one burst of energy in weakening Depression Dalila

July 25, 2019

Researcher’s innovative flood mapping helps water and emergency management officials

July 25, 2019
Please login to join discussion

POPULAR NEWS

  • Robotic Ureteral Reconstruction: A Novel Approach

    Robotic Ureteral Reconstruction: A Novel Approach

    82 shares
    Share 33 Tweet 21
  • Digital Privacy: Health Data Control in Incarceration

    63 shares
    Share 25 Tweet 16
  • Study Reveals Lipid Accumulation in ME/CFS Cells

    57 shares
    Share 23 Tweet 14
  • Breakthrough in RNA Research Accelerates Medical Innovations Timeline

    53 shares
    Share 21 Tweet 13

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Succinate Receptor 1 Limits Blood Cell Formation, Leukemia

Palmitoylation of Tfr1 Drives Platelet Ferroptosis and Exacerbates Liver Damage in Heat Stroke

Oxygen-Enhanced Dual-Section Microneedle Patch Improves Drug Delivery and Boosts Photodynamic and Anti-Inflammatory Treatment for Psoriasis

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 73 other subscribers
  • Contact Us

Bioengineer.org Ā© Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org Ā© Copyright 2023 All Rights Reserved.