Defender's false alert that erased DigiCert's root certificates and unleashed chaos on Windows

Published 3 min de lectura 121 reading

In recent days many Windows administrators and users saw alerts linking legitimate DigiCert certificates to detection Trojan: Win32 / Cerdigent.A! dha from Microsoft Defender; in some teams those certificates were even removed from the Windows Trust Store (AuthRoot), causing confusion and, in extreme cases, unnecessary reinstallations of the operating system.

The immediate cause was an update of Defender's signatures sent in late April that added that detection; Microsoft then distributed corrections to the security intelligence versions 1.449.430.0 and successor 1.449.431.0 to remove the false positive and, according to reports, restore deleted certificates in affected systems. The detection description is available in the Microsoft encyclopedia: Microsoft Malware Encyclopedia, and the initial technical coverage following the incident is available on BleepingComputer: BleepingComputer.

Defender's false alert that erased DigiCert's root certificates and unleashed chaos on Windows
Image generated with IA.

This event comes in parallel to a security incident in DigiCert where attackers obtained "initialization codes" that allowed to issue some EV code signature certificates, several of which were used to sign malware. This gap explains why researchers saw DigiCert certificates linked to malicious campaigns, but the entries that Defender marked were root certificates in the trust warehouse, not necessarily the revoked code signature certificates, which adds complexity to the research and increases the risk of collateral damage to the automatic management of signatures by AV solutions.

The practical implications are important: the removal or alteration of the AuthRoot can produce TLS / HTTPS errors, errors in validation of code signatures and problems in applications that depend on the system's confidence chain. For organizations this can be translated into inaccessible services, signatures rejected by Windows SmartScreen or interruptions in deployment flows and updates.

If your environment was affected, avoid drastic actions like reinstalling the system without first verifying basic facts. First, forges the update of Defender's signatures(Windows Security > Virus and Threat Protection > Protection Updates > Search for updates) or check for PowerShell the signature version with Get-MpComputerStatus (Defender module). After updating, check if the certificates were automatically restored and run a complete analysis with Defender to confirm that there are no malicious remains.

If the certificates remain absent, check the local warehouse and records: with PowerShell you can list the local root store (Cert:\ LocalMachine\ AuthRoot) and export / re-import legitimate certificates if you have a copy. Windows can also recover roots through the automatic certificate update service, and if you need to manually restore you can use certutil or PowerShell to add reliable certificates. In any case, it keeps copies of the certificates and the registration before making changes and documents the audit intervention.

Defender's false alert that erased DigiCert's root certificates and unleashed chaos on Windows
Image generated with IA.

In addition to restoring confidence, it adopts post-incident controls: it verifies system integrity with SFC / scannow and DISM / Online / Cleanup-Image / RestoreHealth, reviews recent login and accesses, breaks exposed administrative credentials and applies search for commitment indicators (IoC) related to the campaign that used compromised certificates. If you manage many endpoints, prioritize the updating of signatures in your central administration tools and monitor help desks and forums to diagnose devices that have received automatic removal actions.

Finally, it is important to separate two related but different problems: the fraudulent issue or malicious use of signature certificates (the problem originating in DigiCert) and the false positive antivirus solutions that affect root certificates. For monitoring and technical context, check the public trail of the DigiCert incident (discussion on technical platforms such as Mozilla's tracking bug) and Microsoft's disclosure on detection: Bugzilla on the DigiCert incident.

If you need to, I can help you write specific procedures to audit and, if appropriate, restore certificates on a team or fleet, including recommended commands and minimum forensic checks before accepting any automatic restoration.

Coverage

Related

More news on the same subject.