This resource is no longer available
Since its inception, the process of cryptographically signing a piece of code was designed to give the operating system a way to discriminate between legitimate and potentially malicious software.
Unfortunately, this system is built on a problematic core tenet: Trust. This inherited trust model is taken advantage of by malware authors who purchase certificates directly or via resellers.
Chronicle researchers hunted within VirusTotal to gain a deeper understanding of this issue. Download this white paper to uncover their findings.