Threat Advisory

Microsoft’s Trusted Signing Service Abused to Sign Malware

Threat: Malware
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High

EXECUTIVE SUMMARY:

Microsoft’s Trusted Signing service has been exploited to sign malware, allowing attackers to distribute malicious software that appears legitimate. Threat actors abused a feature that lets developers submit unsigned kernel-mode drivers for signing, enabling them to bypass security mechanisms. Researchers discovered multiple cases of this misuse, where signed malware was used to install rootkits and disable security software. Microsoft has since revoked the malicious certificates and tightened security, but the incident raises concerns about the risks of trusted code-signing services.

Attackers submitted unsigned drivers to Microsoft’s signing program, gaining legitimate signatures that granted elevated privileges on Windows systems. The malware, often delivered via phishing or trojans, was used to disable antivirus software, escalate privileges, and establish persistence. Security analysis revealed advanced evasion techniques, including obfuscation and encrypted communication with command-and-control servers. Some malware families linked to these attacks were associated with cybercrime groups and state-sponsored actors. Since Microsoft-signed binaries are inherently trusted, this technique significantly increased the malware’s effectiveness.

This abuse highlights the risks of code-signing mechanisms and the need for stronger verification processes. While Microsoft has revoked malicious certificates and enhanced security, attackers continue to adapt. Organizations should adopt a layered security approach, including endpoint detection, behavioral analysis, and strict execution policies. The incident underscores the broader risk of trusted signing services being exploited and emphasizes the need for proactive monitoring and improved security controls.

THREAT PROFILE:

Tactic Technique ID Technique
Persistence T1542 Pre-OS Boot
Privilege Escalation T1068 Exploitation for Privilege Escalation
Defense Evasion T1553 Subvert Trust Controls
T1207 Rogue Domain Controller
T1014 Rootkit
Credential Access T1552 Unsecured Credentials
Command and Control T1573 Encrypted Channel
Impact T1499 Endpoint Denial of Service

REFERENCES:

The following reports contain further technical details:
https://www.bleepingcomputer.com/news/security/microsoft-trusted-signing-service-abused-to-code-sign-malware/

crossmenu