In relationship to the security incident that the self-titled attacker “Comodohacker” caused to security providers, in particular Certificate Authorities, Globalsign didn’t find any evidence of :
- Rogue Certificates issued.
- Customer data exposed.
- Compromised GlobalSign Root Certificate keys and associated Hardware Security Modules (HSM).
- Compromised GlobalSign Certificate Authority (CA) infrastructure.
- Compromised GlobalSign Issuing Authorities and associated HSMs.
- Compromised GlobalSign Registration Authority (RA) services.
What did happen
- Peripheral web server, not part of the Certificate issuance infrastructure, hosting a public facing web property was breached.
- What could have been exposed? Publicly available HTML pages, publicly available PDFs, the SSL Certificate and key issued to www.globalsign.com.
- SSL Certificate and key for www.globalsign.com were deemed compromised and revoked.
The full storycan be found at GlobalSign.