This resource is no longer available

Cover Image

Since its inception, the process of cryptographically signing a piece of code was designed to give the operating system a way to discriminate between legitimate and potentially malicious software.

Unfortunately, this system is built on a problematic core tenet: Trust. This inherited trust model is taken advantage of by malware authors who purchase certificates directly or via resellers.

Chronicle researchers hunted within VirusTotal to gain a deeper understanding of this issue. Download this white paper to uncover their findings.

Vendor:
Chronicle
Posted:
Feb 8, 2021
Published:
May 21, 2020
Format:
PDF
Type:
White Paper

This resource is no longer available.