Okezone.com : Iranian Hackers Trick the International Internet Users

JAKARTA - A new study from Trend Micro found that Internet users in more than 40 different network from the Internet Provider and the University of Iranians turned out to contain fake SSL certificate issued by Diginotar.
Site providers and vendors of Certificate Authority SSL certificate Netherlands, was used to spy on Internet users in Iran on a large scale.
In theory, false certificates could be used to trick users into visiting a counterfeit version of a Web site, or used to monitor communication with the real site without the user noticing.
But in order for the trick of a false certificate, a hacker must be able to drive targeted Internet traffic through a server that he controls. That is something that only the Internet service provider, or government with a single command, and can easily do so.
Iranian state itself does not have a Certificate Authority (Certificate Authority) itself. If they do, they can only issue a certificate naughty tricked. However, because they do not have it necessarily require an official certificate from a trusted CA such as from Diginotar.
Trend Micro to see this oddity that makes the site an SSL certificate provider, Diginotar under the mercy of hackers in Iran. So that was launched through its official statement on Saturday (17/09/2011).
At this time nearly hundreds of thousands of unique IP addresses from Iran requesting access to google.com using fake certificates issued by DigiNotar. Trend Micro detects thousands of unique IP addresses requested to google.com has been identified. On August 4 the number of requests to increase rapidly until a certificate is revoked on August 29.
The evidence was based on data collected from time to time thanks to the Trend Micro Smart Protection Network is showing fake SSL certificate issued by Diginotar, used to spy on Internet users in Iran on a large scale.