If one has a phishing website that uses the original certificate that was obtained by accessing that website, can an attack fool users to believe they are accessing legitimate websites?
If not, how will it get caught?
If one has a phishing website that uses the original certificate that was obtained by accessing that website, can an attack fool users to believe they are accessing legitimate websites?
If not, how will it get caught?
If one has a phishing website that uses the original certificate that was obtained by accessing that website,
No it cannot, because it does not have access to the original website's private key. If it could, the whole PKI would make no sense at all.
can an attack fool users to believe they are accessing legitimate websites?
Yes, but using means other than the original certificate.
If not, how will it get caught?
The phishing website will not "get caught". User will not see a correct certificate in the client's browser.
If one has a phishing website that uses the original certificate that was obtained by accessing that website, can an attack fool users to believe they are accessing legitimate websites?
Yes. As long as they get the private key too.
To spoof a valid certificate (and get a green SSL-Padlock) only two ways exists, I know:
If not, how will it get caught?
As techraf already said, if the cert ist not trusted, e.g. because it is self signed or the CA was thrown out of your keychain, you an error like this:
Don't you need the same domain name for #1 to work? Won't LetsEncrypt do the same as #2 but without trying to be sneaky or illegal?
You need to somehow lead the victim to your own server, yes. This can be down by owning the DNS. Ebay was stolen a few years ago.
But you are right. Using the certificate does only make sense, if the original domain is used. Phising uses normally different domains, which you can officially and legally just get a certificate
This is in fact not impossible. Besides the stolen private key, there is another attack.
If anywhere on the https site there is an XSS attack that allows javascript injection (even if the page is normally unreachable) someone can place a link into email that exploits the XSS to overwrite the page with a form that sends submit= to an https site of the attacker's choosing.
Or maybe somebody hijacked DNS only and want to see who's dumb enough to click on phishing links before beginning a spear phishing attack.
There are a great many things you could mean by "phishing website use the original certificate." If you mean literally the exact same certificate, in most cases no they won't have access to that. (Although that is not impossible, it's just less likely.)
If someone at some point can issue certificates from a trusted certificate authority it's much easier to then simply issue a new certificate for the phishing domain.
The most likely ways to attack you in this case would be someone with control of your ISP or wireless networks you connect to. Large corporations have been known to do this to their company's internet traffic to allow them to inspect encrypted traffic.
The point here is that really, yes it's possible to falsify certificates at some levels, it's not really likely to be something you'll see.
A spoofed web-site could use a fake chains of certificate or use a spoofed trust-anchor to get the HTTPS icon of the browser shows "the closed padlock". The attacker need to spoof just one of the possible trusted ancors for the situation. It depends on the attacked browser settings too and it's level of confidence with the trusted ancors.
Check here for the trust anchor definition
Check here for chains of trust definition
Check for the certification authority definition