Certificate transparency logs are designed to protect users by making SSL/TLS certificate issuance publicly auditable. However, this same transparency creates a powerful reconnaissance tool for adversaries who can mine these records to discover infrastructure secrets organizations never intended to expose.
Certificate Transparency (CT) was introduced by Google in 2013 as an open framework for monitoring and auditing SSL/TLS certificates. The system requires that every certificate issued by a publicly-trusted Certificate Authority be logged in a publicly accessible, append-only database. While CT is essential for detecting mis-issued or fraudulent certificates, it simultaneously creates an exhaustive map of every domain and subdomain an organization has ever protected with a certificate. For security teams, this means internal staging environments, development databases, CI/CD servers, and administrative panels can all be discovered by a simple query to crt.sh or Censys.
According to CISA's supply chain guidance, adversaries routinely mine CT logs to build comprehensive target profiles before launching attacks. The NIST Cybersecurity Framework recommends that organizations proactively audit their own certificate exposure as part of Identify (ID) and Protect (PR) functions. CSO Online reports that certificate-based reconnaissance is one of the fastest-growing attack surface discovery methods, with CT log searches now being integrated into automated reconnaissance frameworks used by both red teams and APT groups.
Digital certificates (also called SSL/TLS certificates or X.509 certificates) are electronic documents that use cryptography to bind a public key with an identity, such as a website domain, organization name, or individual. They are issued by trusted entities called Certificate Authorities (CAs) like DigiCert, Let's Encrypt, Sectigo, and GlobalSign. When you see the padlock icon in your browser, it means the website presented a valid certificate that has been verified against a chain of trust.
Digital certificates are like a restaurant's health inspection certificate posted on the wall. Anyone walking by can check it, you can see the restaurant's name, the inspector who signed it, and when it expires. Certificate transparency takes this further: it's as if every health inspection certificate ever issued is photocopied and placed in a public filing cabinet at city hall. An attacker can simply browse the cabinet to find restaurants (domains) that have back kitchens (internal subdomains) not listed on the main menu.
| Term | Definition | Analogy |
|---|---|---|
| Certificate Authority (CA) | A trusted organization that issues digital certificates, verifying the identity of the certificate requestor before signing. | The government office that issues official ID cards or passports |
| Certificate Transparency (CT) Log | A publicly accessible, append-only database that records all SSL/TLS certificates issued by publicly-trusted CAs. | A public ledger at city hall recording every business license ever issued |
| Subject Alternative Names (SANs) | An X.509 extension that allows a single certificate to cover multiple domain names (including subdomains and wildcard entries). | An all-access pass that lists every room in a building you're authorized to enter |
| Wildcard Certificate | A certificate that covers all subdomains at a single level (e.g., *.acmecorp.com covers any subdomain). | A master key card that opens every door on one floor of a building |
| Certificate Chain | The hierarchical path of trust from the end-entity certificate through intermediate CAs up to a trusted Root CA. | A chain of custody: store manager → regional director → corporate CEO |
| crt.sh | A free, web-based search engine that queries certificate transparency logs maintained by the CAcert project. | Google for restaurant inspection certificates, search any name, see every license |
| Extended Validation (EV) | The highest level of certificate validation, requiring rigorous verification of the organization's legal identity and physical existence. | A background-checked VIP badge, more trustworthy but reveals more about you |
| Certificate Fingerprint | A unique hash (SHA-1 or SHA-256) that identifies a specific certificate, used for pinning and verification. | A fingerprint, unique to one person, used for positive identification |
Natalie Park is a senior security engineer at Meridian Financial Services, a mid-size fintech company managing retirement accounts for over 200,000 clients. On a routine Tuesday morning, she receives an alert from the company's external attack surface management (EASM) tool: 23 previously unknown subdomains have been discovered through public certificate transparency logs. What follows is a story of how a seemingly harmless certificate request exposed the company's entire internal infrastructure to potential attackers.
Three months earlier, a developer on Meridian's platform team needed to test a new payment processing feature. To speed up testing, they requested a free Let's Encrypt certificate for staging-payments.meridianfs.com. Because Let's Encrypt automatically logs every issued certificate to CT logs, this single certificate, intended only for internal use, now permanently existed in public databases. The developer had also included several related subdomains in the SANs field: api-staging.meridianfs.com, db-test.meridianfs.com, and jenkins-build.meridianfs.com. Each of these pointed to infrastructure that was never meant to be accessible from the public internet.
An APT group tracked as "Crimson Sands" was conducting reconnaissance against financial services firms. Using open technical database searches (T1596), an operator queried crt.sh for %.meridianfs.com. The results returned 847 certificates spanning 14 years. By analyzing the SANs fields across all certificates, they identified 63 unique subdomains, including 23 that were not referenced anywhere on Meridian's public website, DNS records, or marketing materials. Cross-referencing with domain property data (T1590.001), they determined which subdomains resolved to public IP addresses and which CAs had issued the certificates. The Let's Encrypt certificates for staging environments were particularly valuable because they indicated recently deployed, potentially less-secured infrastructure.
The attacker group focused on staging-payments.meridianfs.com, which resolved to an AWS Elastic Load Balancer. The staging server was running an outdated version of Apache Struts with a known remote code execution vulnerability. Because the server was believed to be "internal-only," it had not been included in Meridian's regular vulnerability scanning cycle (see T1595.002). Crimson Sands exploited the Struts vulnerability, gained initial access, and spent 47 days moving laterally through the network before Meridian's security team detected anomalous traffic patterns. By the time the breach was contained, the attackers had exfiltrated personal information of approximately 12,000 clients.
Upon receiving the EASM alert, Natalie immediately launched a comprehensive certificate audit. She worked with the DevOps team to implement a policy requiring all certificate requests to go through a centralized certificate management team with security review. She set up automated monitoring that alerts whenever a new certificate containing a Meridian domain appears in any CT log. She also worked with the infrastructure team to ensure that internal staging environments were only accessible through the corporate VPN, not through public DNS resolution. Most importantly, she deployed a passive DNS monitoring (T1596.001) system to detect unauthorized DNS records pointing to Meridian's infrastructure. Six months later, Meridian had reduced its CT log-exposed attack surface by 78%, and the new certificate governance process prevented all future accidental exposures of internal subdomains.
Every certificate your organization requests, whether for production, staging, development, or testing, creates a permanent public record that adversaries can discover and exploit. Natalie's story illustrates that the problem isn't certificate transparency itself (which is essential for web security), but rather the lack of governance over what domains are included in certificate requests and how internal infrastructure is exposed through software and service configuration (T1592.002).
Before you can protect your certificate attack surface, you need to understand what's already exposed. Query public CT logs for every domain and subdomain your organization controls.
%.yourdomain.com, the percent sign acts as a wildcard to find all subdomainsopenssl s_client -connect target:443 2>/dev/null | openssl x509 -noout -text to inspect live certificates for SAN entriesNot all exposed subdomains represent the same level of risk. Categorize each discovered subdomain based on its purpose and the sensitivity of the data it handles.
Create and enforce policies that control who can request certificates and what domains can be included in certificate requests.
The most effective way to prevent internal subdomain exposure through CT logs is to avoid using publicly-trusted CAs for internal infrastructure entirely.
Set up automated monitoring that alerts you whenever a new certificate containing your organization's domains appears in any public CT log.
certspotter, ct-monitor, or commercial EASM platforms for real-time CT log monitoringEven if a subdomain is discovered through CT logs, network segmentation ensures that attackers cannot reach the underlying infrastructure.
Maintain an ongoing program of certificate auditing and adversarial testing to identify new exposure before attackers do.
For red teams and real-world adversaries, certificate transparency logs represent one of the highest-value, lowest-cost reconnaissance sources available. A single crt.sh query can reveal more about an organization's infrastructure than weeks of port scanning.
Discovery Phase:
crt.sh/?q=%.target.com to enumerate all subdomains ever protected by public certificatesTarget Selection:
Exploitation:
Blue teams must shift from treating certificate transparency as a compliance requirement to recognizing it as a critical attack surface that requires active management and monitoring.
Detection:
certspotter, ct-monitor, or commercial EASM) to detect new certificates for your domains in real timePrevention:
Response:
Threat hunters and SOC analysts should understand the specific patterns that indicate an adversary is using certificate transparency logs as part of their reconnaissance operations. The following attack patterns represent the most common and dangerous ways this technique is abused in the wild.
Attackers systematically query CT logs for every subdomain ever associated with a target organization. They focus on identifying subdomain sprawl, the gradual accumulation of certificates for staging, testing, and abandoned infrastructure that the organization has lost track of. This pattern is particularly effective against large enterprises that have undergone mergers, acquisitions, or major technology migrations.
Hunting Query: Monitor for high-frequency CT log queries from single IP ranges targeting your domain space
By analyzing which CAs have issued certificates for a target, attackers build a "certificate ecosystem profile" that reveals the organization's security maturity. Heavy use of free CAs like Let's Encrypt for internal infrastructure suggests developer-driven, ungoverned certificate management. Exclusive use of premium CAs like DigiCert with EV validation suggests a more mature security posture but also reveals organizational structure through EV certificate details.
Hunting Query: Track certificate issuance patterns by CA to identify shifts in security practices or new infrastructure deployment
Certificate issuance dates reveal when specific infrastructure was deployed. By tracking certificate lifecycle events, issuance, renewal, expiration, and re-issuance, attackers can infer the target's technology refresh cycles, identify recently deployed systems that may not yet be fully hardened, and detect when infrastructure is being decommissioned (expired certificates for subdomains that still resolve in DNS).
Hunting Query: Cross-reference expired certificates with active DNS records to find "zombie" infrastructure
Extended Validation (EV) certificates and organization-validated certificates contain verified business details: legal company name, address, jurisdiction, and business registration number. Attackers mine these details to build dossiers for social engineering campaigns, business email compromise (BEC), and spear-phishing attacks. The organizational details in certificates are often more accurate and up-to-date than public business registries.
Hunting Query: Audit EV certificate organizational fields for sensitivity and compare against public business filings
Organizations that use wildcard certificates (*.domain.com) create a particularly rich reconnaissance target. While the wildcard itself appears in CT logs, the actual subdomains it covers are often revealed through related certificates, DNS records, and web content. Attackers who discover a wildcard certificate know that any subdomain they find through other means will be covered by the same trust relationship, which helps them prioritize which subdomains to target.
Hunting Query: Monitor for wildcard certificate renewal patterns and cross-reference with domain property changes
Sophisticated threat actors set up automated systems that continuously monitor CT logs for changes in a target's certificate landscape. A new certificate for a previously unseen subdomain immediately flags new infrastructure deployment. A certificate issued by an unusual CA may indicate a compromised system or a third-party integration that hasn't been security-reviewed. This passive, persistent monitoring provides attackers with near-real-time intelligence about the target's infrastructure evolution.
Hunting Query: Deploy your own CT log change detection to match adversary monitoring speed, detect what they detect, when they detect it
Defenders should use the same tools as attackers to understand their own exposure. Key resources include:
Have you audited your organization's certificate transparency exposure? What subdomains did you discover that shouldn't have been public? Share your experience, ask questions, or discuss certificate reconnaissance strategies with the community.
Discussion Prompts: What's the most surprising subdomain you've found in your own CT log audit? Has your organization implemented a private CA? How do you balance developer agility with certificate governance?
This page is part of the MITRE ATT&CK T1596, Search Open Technical Databases series. Explore related techniques:
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.