In recent days several project developers widely used in Windows found themselves unexpectedly without access to their accounts in Microsoft's hardware program, which prevented new versions and patches from being published. Among those affected were tools known as WireGuard, VeraCrypt, MemTest86 and Windscribe, whose perpetrators reported sudden blockades and difficulties in contacting support.
Microsoft has now launched an emergency procedure to accelerate the return of these accounts after the avalanche of complaints forced a public response. The company explains that the suspension was due to the lack of identity verification required to participate in the Windows Hardware Program, a requirement that, according to its officials, was communicated by mail since October 2025. The official note is available on Microsoft's blog for hardware developers: Microsoft Advisory: Action required - Account verification for Windows Hardware Program.

Those affected described a different experience: unannounced closed accounts and a cumbersome or unattainable appeal process. The developer of VeraCrypt published in the forums his problem with the termination of account and the impossibility of reaching human support; his message can be read in SourceForge: VeraCrypt thread. Similarly, project leaders such as WireGuard and others reported blockages and long resolution times in public threads, such as follow-up on Hacker News: discussion of blockades. Messages from the official accounts of affected projects also showed the problem, for example the publications of MemTest86 and Windscribe in X: MemTest86 and Windscribe.
From Microsoft, team members - including Scott Hanselman - have publicly explained that identity verification is necessary because the program allows to distribute controllers at the kernel level, software parts that operate with very high privileges and that, in the wrong hands, can be exploited in sophisticated attacks. Hanselman's conversation about the requirement can be seen in his release on X: published by Scott Hanselman. For those in need of technical context, Microsoft maintains documentation on driver signature and security policies: Driver signing - Microsoft Docs.
The speed with which the accounts were closed and the interruptions in the ability to publish updates raised legitimate questions about the capacity to respond to vulnerabilities. If a project temporarily loses the possibility of launching patches, the user exposure window can be expanded, with the resulting risk to systems that depend on such projects.
In the face of public pressure, Microsoft has added a temporary recovery path: an accelerated procedure that goes by opening a support case through the Hardware Program; that is, according to the company, the fastest way to request the reinstallation of access. The application should include a clear commercial justification for the intended use of the Hardware Dev Center and, although the account can be recovered quickly, the outstanding compliance obligations must be completed to recover full access.
The company also addressed reported problems with the support flow: it recommended that it is authenticated with the correct account when sending tickets and proposed to continue to insist with the assistant Copilot to generate an incidence if the automated track does not work. For those who are unable to open applications for standard channels, Microsoft has provided an alternative contact way to start the process. All the explanation and summary of the process are in the company's notice mentioned above: details of the procedure and alternative contacts.
It is important to stress that Microsoft has not specified the duration of this temporary mechanism, so the affected developers have been urged to act quickly if they want to minimize time without access.

Beyond the immediate resolution, this episode shows a known dilemma between security and the developer's experience: measures to protect the ecosystem - such as the identity verification of those who can sign controllers - are technically justified, but its implementation requires robust communication channels and support not to interrupt the maintenance of critical software. In other words, strengthening security cannot result in a lack of predictability that prevents the distribution of patches.
For projects and software managers working with sensitive components on Windows, it is appropriate to draw some practical lessons: keep up-to-date contact data associated with the distributor accounts, check on time the verification notices that arrive by mail and see alternative patch distribution or delivery routes in exceptional situations. It is also reasonable for Microsoft to review its reporting processes and support tools to reduce friction when administrative verification threatens to paralyze critical updates.
As accounts are restored and compliance requirements are completed, the community will continue to monitor how Microsoft balances the need to protect the operating system with the obligation to allow reliable developers to maintain and update essential software. In order to monitor the development of the case and the responses of the projects involved, the primary sources mentioned in this text and the official channels of the projects concerned, such as WireGuard and the VeraCrypt page: VeraCrypt.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...