Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Microsoft Defender wrongly flags DigiCert certs as Trojan:Win32/Cerdigent.A!dha
    Cybersecurity

    Microsoft Defender wrongly flags DigiCert certs as Trojan:Win32/Cerdigent.A!dha

    adminBy adminMay 3, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Microsoft
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Microsoft

    Microsoft Defender is detecting legitimate DigiCert root certificates as Trojan:Win32/Cerdigent.A!dha, resulting in widespread false-positive alerts, and in some cases, removing certificates from Windows.

    According to cybersecurity expert Florian Roth, the issue first appeared after Microsoft added the detections to a Defender signature update on April 30th.

    Today, administrators worldwide began reporting that DigiCert root certificate entries were flagged as malware and, on affected systems, removed from the Windows trust store.

    According to a Reddit post about the false positives, the detected certificates are:

    • 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
    • DDFB16CD4931C973A2037D3FC83A4D7D775D05E4

    On impacted systems, these certificates were removed from the AuthRoot store under this Registry key:

    
    HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\

    These false positives have led to concern among Windows users, with some thinking their devices were infected and reinstalling the operating system to be safe.

    Microsoft Defender
    Microsoft Defender “Trojan:Win32/Cerdigent.A!dha” False Positive
    Source: Reddit

    Microsoft has reportedly fixed the detections in Security Intelligence update version 1.449.430.0, and the most recent update is now 1.449.431.0.

    Other reports on Reddit indicate that the fix also restores previously removed certificates on affected systems.

    The new Microsoft Defender updates will automatically install, and Windows users can manually force an update by going into Windows Security > Virus and threat protection > Protection updates and clicking on Check for Updates.

    Possibly linked to a recent DigiCert breach

    The false positives occur shortly after a disclosed DigiCert security incident that enabled threat actors to obtain valid code-signing certificates used to sign malware.

    “A malware incident targeted a customer support team member. Upon detection, the threat vector was contained,” explains the DigiCert incident report.

    “Our subsequent investigation found that the threat actor was able to procure initialization codes for a limited number of code signing certificates, few of which were then used to sign malware.”

    “The identified certificates were revoked within 24 hours of discovery and the revocation date set to their date of issuance. As a precautionary measure, pending orders within the window of interest were cancelled. Additional details will be provided in our full incident report.”

    According to DigiCert’s incident report, attackers targeted the company’s support staff in early April by creating support messages containing a malicious ZIP file disguised as a screenshot.

    After multiple blocked attempts, one support analyst’s device was eventually compromised, followed by a second system that went undetected for a time due to an endpoint protection “sensor gap.”

    Using access to the breached support environment, the hacker used a feature in DigiCert’s internal support portal that allowed support staff to view customer accounts from the customer’s perspective.

    While limited in scope, this access exposed “initialization codes” to previously approved, but undelivered, EV code-signing certificate orders.

    “Possession of an initialization code, combined with an approved order, is sufficient to obtain the resulting certificate (see Contributing Factors discussion below),” explained DigiCert.

    “Since the threat actor was able to obtain these two pieces of information for a finite set of approved orders, they were able to obtain EV Code Signing certificates across a set of customer accounts and CAs.”

    DigiCert says it revoked 60 code-signing certificates, including 27 linked to a “Zhong Stealer” malware campaign.

    “11 were identified in certificate problem reports provided to DigiCert by community members linking the certificates to malware, and 16 were identified during our own investigation,” explained DigiCert.

    Zhong Stealer malware campaign

    This aligns with earlier reports from security researchers who had observed newly issued DigiCert EV certificates used in malware campaigns and reported them to DigiCert.

    Researchers, including Squiblydoo, MalwareHunterTeam, and g0njxa, reported that certificates issued to well-known companies such as Lenovo, Kingston, Shuttle Inc, and Palit Microsystems were being used to sign malware.

    “What do Lenovo, Kingston, Shuttle Inc, and Palit Microsystems have in common?,” posted Squiblydoo on X.

    “EV Certificates from these companies were issued and used by a Chinese crime group, #GoldenEyeDog (#APT-Q-27)!”

    The malware in this campaign is named “Zhong Stealer,” though analysis indicates it may be more like a remote access trojan (RAT) than an infostealer.

    The researcher says the malware was distributed through the following attacks:

    • Phishing emails deliver a fake image or screenshot
    • A first-stage executable that displays a decoy image
    • Retrieval of a second-stage payload from cloud storage such as AWS
    • Use of signed binaries and loaders, including components tied to legitimate vendors

    After DigiCert disclosed the incident, the researchers said the incident report explains how the certificates used in these malware campaigns were obtained.

    While Microsoft has not confirmed that the Defender detections are a result of the DigiCert incident, the timing and focus on DigiCert-related certificates suggest a possible connection.

    However, it should be noted that the certificates flagged by Microsoft Defender are root certificates in the Windows trust store and do not match the revoked DigiCert code-signing certificates used to sign malware.

    BleepingComputer contacted Microsoft with questions about the campaign, including whether it was tied to DigiCert’s breach.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot

    certs Defender DigiCert flags Microsoft TrojanWin32Cerdigent.Adha wrongly
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAsk.com shuts down after over 25 years
    Next Article ChatGPT advanced account security adds passkeys and hardware keys
    admin
    • Website

    Related Posts

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026

    Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    How to measure AI search visibility: KPIs & reporting

    May 21, 2026

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026

    Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’

    May 21, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,215)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (306)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    How to measure AI search visibility: KPIs & reporting

    May 21, 2026

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026
    Most Popular
    • How to measure AI search visibility: KPIs & reporting
    • Mueller Explains Why Google Uses Markdown On Dev Docs
    • Google Marketing Live 2026: Everything you need to know
    • Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’
    • 12 Awesome Custom Google Analytics Reports Created by the Experts
    • Selector targets the network visibility gap in multi-cloud infrastructure
    • How to Persuade Your Boss to Send You to Ahrefs Evolve in San Diego
    • Key AEO & Content Trends for 2026
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.