Hackers Trick DigiCert Into Issuing Certificates Used to Sign Malware
Overview
Hackers managed to trick DigiCert into issuing 60 code signing certificates that were then used to sign the Zhong Stealer malware. This incident unfolded when attackers utilized a malicious attachment in a support chat, allowing them to bypass security protocols. As a response, DigiCert has revoked the compromised certificates to prevent further misuse. This breach raises significant concerns about the security of certificate authorities and the potential for malware to appear more legitimate, which could mislead users and organizations. The incident emphasizes the need for tighter security measures in the issuance of digital certificates, as they play a crucial role in establishing trust online.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: DigiCert code signing certificates, Zhong Stealer malware
- Action Required: Revocation of compromised certificates.
- Timeline: Newly disclosed
Original Article Summary
DigiCert revokes 60 code signing certificates after hackers used a malicious support chat attachment to sign the Zhong Stealer malware.
Impact
DigiCert code signing certificates, Zhong Stealer malware
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Revocation of compromised certificates
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Malware.