Researchers have uncovered a critical vulnerability in RSA encryption, revealing that approximately 1 in 172 certificates found online are susceptible to compromise through a mathematical attack. This flaw primarily affects IoT devices but could also impact any system using improperly generated RSA keys. The root cause of the vulnerability lies in insufficient random number generation during key creation, especially in devices with limited entropy sources. When RSA keys lack proper randomness, they may share prime factors with other keys, making them vulnerable to factorization attacks. Keyfactor Security researchers analyzed over 75 million RSA certificates and found that 435,000 of them were compromised using a relatively simple mathematical technique. The attack exploits a fundamental RSA property: if two different keys share a prime factor, both can be broken by computing their Greatest Common Divisor (GCD). While traditional RSA factorization is computationally challenging, shared factors make key recovery trivial. The researchers efficiently performed GCD computations using the GNU MultiPrecision (GMP) library on a single cloud-based virtual machine. Instead of pairwise GCD calculations, they used a product tree and remainder tree approach to optimize performance. Furthermore, their findings indicate that IoT devices are particularly at risk, with nearly 50% of compromised certificates linked to a major network equipment manufacturer. Despite previous warnings, many affected devices continue to use vulnerable keys, highlighting the difficulty of patching IoT systems.
The Pakistan-nexus advanced persistent threat group APT36 (also known as Transparent Tribe) has launched targeted spear-phishing attacks against Indian government entities during A...
A critical authorization bypass vulnerability (CVE-2025-9133) has been discovered in ZYXEL ATP and USG series network security appliances. Attackers can circumvent two-factor authe...
Proofpoint has issued an open-source tool, PDF Object Hashing, that is aimed at identifying malicious PDFs based on their structural fingerprints. Instead of the usual detection us...