DigiCert Hack Uses Screensaver Malware to Steal Certificates
Trusted Channels, Hidden Payloads: Inside the DigiCert Screensaver Attack As an independent cybersecurity blogger and part-time penetration tester, this attack stands out for one critical reason: It bypasses security not through exploitation, but through trust. A simple file. A familiar format. A believable scenario. That was all it took to compromise a highly trusted certificate authority environment. What Happened: Screensaver File Used to Breach DigiCert Systems Attackers successfully breached DigiCert’s internal environment using a malicious payload disguised as a screenshot , delivered via a customer support interaction. Key details include: Malware delivered through a customer chat support channel Payload disguised as a harmless file Infection of internal support endpoints Access to DigiCert’s internal support systems Once inside, attackers were able to pivot and access sensitive certificate-related functions. Why This Issue Is Critical: Code Signing Cert...