Attack Delivered via Legitimately Signed Update

The malicious artifact carries a valid signature from the vendor's real signing key, so traditional allow-by-signature controls (Authenticode policy, Cosign verification, macOS notarization) do not flag it. Detection must pivot to behavioral indicators, reputation, and anomaly-based signals.

Signals

  • Malicious artifact passes Authenticode / Cosign / notarization verification cleanly
  • EDR reputation services rate the artifact as unknown or low-prevalence despite the valid signature
  • Artifact publishes abnormal telemetry (outbound C2, credential access, persistence) relative to expected vendor behavior

Pivot Actions

  1. 1.Configure EDR policies to treat unknown-prevalence signed binaries as restricted, not allowed-by-default, at least for affected vendor signing certificates
  2. 2.Add short-term signing-certificate-specific block rules that cover the compromised release window while the vendor rotates keys
  3. 3.Hunt by behavior rather than hash: atypical child processes, unusual persistence, outbound network to non-vendor domains
  4. 4.Coordinate with the vendor and CA to revoke affected signing material and publish CRL updates

Alternate Evidence Sources

  • EDR behavioral telemetry (process trees, file events, network events) during the suspected compromise window
  • Certificate Transparency logs and CA revocation records for signing-material timeline
  • Vendor-published clean-build hashes (if available) for positive allowlist enforcement