Blog | G5 Cyber Security

Root Certificates & Phishing: A Security Risk?

TL;DR

Yes, installing a local root certificate can significantly increase your risk of phishing attacks. While useful for development or specific trusted applications, they bypass normal browser security checks and make it harder to identify fake websites. Treat them with extreme caution.

Understanding Root Certificates

Root certificates are the foundation of trust on the internet. When you visit a secure website (HTTPS), your browser verifies its identity using a chain of certificates, ultimately anchored by a trusted root certificate authority (CA). Browsers come pre-loaded with a list of these trusted CAs.

Why Local Root Certificates?

Sometimes, you might need to install a local root certificate. Common reasons include:

However, these certificates aren’t automatically trusted by all browsers or operating systems – you have to explicitly add them.

How They Increase Phishing Risk

  1. Bypassing Browser Warnings: Once a local root certificate is installed and trusted, any website presenting a certificate signed by that root will be considered valid even if it’s fake. Your browser won’t show the usual security warnings about untrusted certificates.
  2. Difficult to Detect Fakes: Because the browser trusts your locally added root, it can’t easily distinguish between legitimate websites and phishing sites using a certificate signed by that same root.
  3. Man-in-the-Middle Attacks: A malicious actor could present a fake website with a certificate signed by a root you’ve installed, allowing them to intercept your traffic and steal sensitive information.

How to Manage Local Root Certificates

Here’s how to find and remove potentially dangerous local root certificates on common operating systems:

Windows

  1. Open Certificate Manager: Press Win + R, type certmgr.msc, and press Enter.
  2. Navigate to Trusted Root Certification Authorities: In the left pane, expand ‘Trusted Root Certification Authorities’ → ‘Certificates’.
  3. Review Certificates: Carefully examine the list of certificates. Look for any you don’t recognize or no longer trust. Pay attention to the ‘Issued To’ and ‘Issuer’ fields.
  4. Delete Untrusted Certificates: Right-click on a suspicious certificate and select ‘Delete’. You may be prompted for administrator privileges.

Caution: Deleting legitimate certificates can break functionality of applications that rely on them.

macOS

  1. Open Keychain Access: Open Finder, go to Applications → Utilities → Keychain Access.
  2. Select ‘System’ keychain: In the left pane, select the ‘System’ keychain.
  3. Search for Certificates: Use the search bar in the top-right corner to find certificates.
  4. Review and Delete: Examine the list of certificates. Look for any you don’t recognize or no longer trust. Right-click on a suspicious certificate and select ‘Delete’. You may be prompted for your administrator password.

Caution: Deleting legitimate certificates can break functionality of applications that rely on them.

Browsers (Chrome, Firefox)

While the operating system manages root trust stores, browsers may have their own settings:

Best Practices

Exit mobile version