Hackers Use Social Engineering Tactics to Obtain Fake SSL Certificates from DigiCert
Malicious Support Chat Attachment Enables Hackers to Issue Fake Certificates for Malware
In April 2026, the support team at DigiCert, a prominent Certificate Authority, fell victim to a sophisticated phishing attack. The attackers exploited a vulnerability in the company’s chat platform to obtain two EV Code Signing certificates, which were subsequently used to sign the Zhong Stealer malware.
The Attack Unfolds
According to an internal investigation conducted by DigiCert, the attackers contacted a support agent via a chat channel and sent a ZIP file purportedly containing a screenshot. However, the file actually contained a malicious executable named k3.exe. Despite internal security measures flagging the threat multiple times, the support agent persisted in opening the file, eventually compromising the workstation known as ENDPOINT1.
Persistent Threats
An analysis of the incident revealed that a malfunctioning CrowdStrike sensor on another machine, ENDPOINT2, had created a gap in the company’s Endpoint Detection and Response (EDR), allowing the attackers to bypass security measures and access an internal support portal. From here, they obtained initialization codes for certificate orders, which enabled them to issue their own valid EV Code Signing certificates.
Damage Control
The attackers breached the system 27 times before being detected, resulting in the revocation of 60 certificates. On April 17, 2026, DigiCert took steps to mitigate the damage, including blocking .scr files in chats and masking sensitive codes in their portal. The company acknowledged that it was fortunate that an independent researcher alerted them to the issue, as it prevented further potential harm.
- The incident highlights the importance of robust security measures and vigilance in preventing attacks on Certificate Authorities.
- Companies must remain vigilant against sophisticated threats and invest in robust security measures to prevent such incidents.
- Regular updates and patches are essential to stay ahead of emerging threats.
