Source: BleepingComputer
Author: Lawrence Abrams
URL: https://www.bleepingcomputer.com/news/security/microsoft-defender-wrongly-flags-digicert-certs-as-trojan-win32-cerdigentadha/
ONE SENTENCE SUMMARY:
Microsoft Defender falsely flagged DigiCert root certificates as Trojan:Win32/Cerdigent.A!dha, removing trust-store entries before Microsoft fixed signatures.
MAIN POINTS:
- Defender signature update on April 30 triggered global false-positive detections, reported by Florian Roth.
- Legitimate DigiCert root certificates were labeled Trojan:Win32/Cerdigent.A!dha, alarming administrators and users.
- Affected Windows systems removed certificates from the AuthRoot trust store automatically.
- Impacted registry path was HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates.
- Reported certificate thumbprints included 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43.
- Second flagged thumbprint was DDFB16CD4931C973A2037D3FC83A4D7D775D05E4.
- Microsoft corrected detections in Security Intelligence update 1.449.430.0; later update 1.449.431.0 followed.
- Reddit users indicated the fix also restored previously removed root certificates.
- Users can force Defender updates via Windows Security “Protection updates” and “Check for Updates.”
- Timing coincided with DigiCert’s incident where attackers obtained EV code-signing certs used for malware.
TAKEAWAYS:
- False positives can directly disrupt Windows trust stores, potentially breaking TLS and software validation.
- Rapid signature rollouts need robust safeguards to avoid widespread certificate trust removals.
- Updating Defender intelligence quickly resolves misdetections and may automatically restore trust entries.
- DigiCert’s breach involved initialization codes and approved orders, enabling issuance of maliciously used certs.
- Defender’s flagged roots differed from revoked code-signing certificates, so linkage remains unconfirmed.