Hi Jin and community,
I can provide some perspective on this. I am a security researcher (formerly Princeton University) and I have been involved in threat investigations related to PKI MITM (similar to the
Klayswap attack ), I wrote two CA/Browser Forum ballots that directly addressed the MitM threat to the PKI (MPIC and DNSSEC ballots which are now part of the baseline requirements), and I have done some work on nation-state censorship/interception behavior (e.g.,
https://arxiv.org/abs/2304.01073 ) (see
https://henrybirgelee.com/ ).
Regarding 1: A long time (if ever). Actually mitigating the MitM risk from a fraudulent certificate is a multi-step process and each step has a high error rate. First the fraudulent certificate and attack needs to be detected. This is often the longest and most difficult step even with CT. I am aware of many attacks where either because of inaccurate root cause analysis or the victim's desire to not make the attack publicly known, the certificate in question simply expires (i.e., is never revoked). Even when a certificate is revoked, it is often long after actual issuance because someone is poking around CT logs. If we take CloudFlare's recent 1.1.1.1 certificate issue for example (see
https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/SgwC1QsEpvc ), this certificate was signed in May 2025 and not revoked until September 2025 ( see
https://crt.sh/?id=18603461241 ). This example comes from one of the highest-profile TLS use cases in the world run by a major cloud provider, so it's reasonable to assume smaller cases are going undetected. Another sample of interest is the certificate involved in the Klayswap attack (
https://crt.sh/?q=6097052179 ). This is one of the cases where threat intel correctly identified the attack in a timely manner and the victim took preventative action. The fraudulent cert was still valid from Feb 3 to Feb 8 2022 ( 5 days). CA removal is a different story and has more to do with the CA's specific behavior or with regard to the CA/Browser Forum Baseline Requirements than simply the presence of a misissued certificate. Sectigo (the CA that signed the Klayswap cert) is still trusted because this cert was signed per CA/B guidelines and Sectigo implemented the appropriate checks during domain validation. The 1.1.1.1 cert is a different story. Regardless, CA removal is a much longer much slower process than cert revocation and requires an incident report and investigation into CA behavior (i.e., it is not an immediate reaction to a known attack cert).
Regarding 2: I would say it depends on the nation state and how extensively the fraudulent certificate was used for interception. Some nation states block VPNs and some populations are less likely to leave the country in a short timeframe (e.g., rural). If a nation-state targeted a MitM attack at specific subpopulations which were not likely to leave the country, I would personally feel it could take much longer than a day. Perhaps targeting of journalists or tourists would see subjects leaving the area affected by the MitM on a more frequent basis. I should note that there is no guarantee that a nation-state MitM is regional. Many nation states have unfiltered BGP routers at their top ISPs and can launch a global interception against many prefixes (e.g.,
Pakistan youtube incident), although this type of attack has significantly more implications in international politics than an internal attack within the nation.
(shameless plug) If you know an organization that is concerned about PKI MitM attacks, I am CEO of a company that specializes in detecting and preventing these types of attacks:
https://www.crosslayerlabs.com/
Let me know if that information is helpful.
Best,
Henry