CyberSecurity news

FlagThis

Lawrence Abrams@BleepingComputer //
Cybercriminals are exploiting Microsoft's Trusted Signing Service by using short-lived, three-day code-signing certificates to sign malware executables. These certificates, issued by "Microsoft ID Verified CS EOC CA 01," make malicious software appear legitimate, allowing it to bypass security filters that typically block unsigned executables. This method of exploitation poses a significant threat to cybersecurity, as it provides a window of opportunity for malware to operate under the guise of legitimacy.

Microsoft is actively monitoring threats and working to mitigate the abuse of its Trusted Signing Service. When threats are identified, Microsoft revokes certificates and suspends accounts to prevent further misuse. The holy grail for threat actors is to obtain Extended Validation (EV) code-signing certificates, as they automatically gain increased trust from many cybersecurity programs due to the more rigorous verification process. The rapid issuance and expiration of certificates make it challenging to detect and revoke them quickly enough to stop all malware campaigns.
Original img attribution: https://www.bleepstatic.com/content/hl-images/2024/01/26/microsoft-red-header.jpg
ImgSrc: www.bleepstatic

Share: bluesky twitterx--v2 facebook--v1 threads


References :
Classification: