Criminals Obtain Code-Signing Certificates Using Stolen Corporate IDs

New research indicates that code-signing certificates are being created using stolen corporate identities.  Malware authors then use these certificates when distributing their malicious software, because most systems assume it can be trusted.  This hard-to-spot malware has been used in a wide range of attacks, such as website spoofing, data exfiltration, and man-in-the-middle attacks.  Application whitelisting technologies and sophisticated endpoint protection can help mitigate this pervasive threat.

Relevant URL(s):