Understanding Code Signing Abuse in Malware Campaigns

Abusing code signing for profit

Cover

Since its inception, the process of cryptographically signing a piece of code was designed to give the operating system a way to discriminate between legitimate and potentially malicious software.

Unfortunately, this system is built on a problematic core tenet: Trust. This inherited trust model is taken advantage of by malware authors who purchase certificates directly or via resellers.

Chronicle researchers hunted within VirusTotal to gain a deeper understanding of this issue. Download this white paper to uncover their findings.

Vendor:
Chronicle
Posted:
21 May 2020
Published:
21 May 2020
Format:
PDF
Length:
7 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!