Threat Hunting for No-Key-Theft-Required Attacks in Trusted Binaries [MITRE ATT&CK T1553.002]


Digitally signed executables provide one layer of trust to prevent attacks that leverage unauthorized or unexpected code. This week, #TechTalkTuesday will explore attacks against digital signatures and how you can avoid or hunt for attackers leveraging this technique. We will examine attacks that specifically don’t require an attacker to compromise the signing key material and leverage vulnerabilities in Windows’ trust algorithms instead.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top