Exposing CurveBall
Elliptic Curve Cryptography-Based Certificate Spoofing (CVE-2020-0601)

Threat Defense Maneuver: Block

Trinity Cyber Threat Detection experts are continuously developing an effective set of response maneuvers to control the desired outcome to known cyber threats. 

An example of a Threat Defense Maneuver is Blocking. By employing Blocking to the threat attacker penetrating the network, companies can best prevent the CurveBall vulnerability in Windows operating system from being exploited. This vulnerability allows adversaries to create fraudulent (“spoofed”) Certificate Authority (CA) certificates. CAs are the top portion of the pyramid of digital-certificate trust. Properly validated CAs ensure corporations such as Microsoft can cryptographically trust certificates in the downstream chain.

Read this Threat Brief to learn: 

  1. How to prevent Certificate Spoofing
  2. How to block the network session before an attack can exploit the vulnerability



Stop CA Spoofing Attacks Today

Download the Threat Brief. 

Extend Your Defensive Strategies Beyond Your Perimeter

Deploy Trinity Cyber Managed Threat Prevention Solution to Stop Attacks Before They Reach Your Network


Man-in-the-Middle Countermeasures

For limitless maneuverability and better prevention than IPS.


Secured, Trusted Internet Traffic

Without interrupting operations or burdening end users.


Mission-Driven Managed Solution

From experts in defending against all forms of attacks.

© 2020 Trinity Cyber, Inc. All Rights Reserved.