Microsoft Defender False Positives Flag DigiCert Certificates as Trojan:Win32/Cerdigent.A!dha – Root Cause, Impact, and Fix Explained

By Imthiyaz Ali
Microsoft Defender False Positives Flag DigiCert Certificates as Trojan:Win32/Cerdigent.A!dha – Root Cause, Impact, and Fix Explained

In a significant cybersecurity incident, Microsoft Defender mistakenly flagged legitimate DigiCert root certificates as malware, specifically identifying them as Trojan:Win32/Cerdigent.A!dha. The issue emerged following a Security Intelligence update released on April 30, triggering widespread false positives across enterprise and consumer Windows systems.

What Happened?

The problem originated from an erroneous malware signature update within Microsoft Defender’s threat detection engine. This update incorrectly classified trusted DigiCert root certificates—critical components of secure web communication—as malicious software.

As a result:

  • Systems began generating false-positive malware alerts.
  • Legitimate certificates were removed from the Windows Certificate Trust Store.
  • Applications relying on these certificates experienced trust failures and connectivity issues.

Impact on Systems and Organizations

The consequences of this misclassification were immediate and far-reaching. DigiCert is one of the world's leading Certificate Authorities (CAs), responsible for securing millions of websites and applications globally.

According to industry estimates:

  • Over 80% of HTTPS-secured websites rely on trusted certificate authorities like DigiCert.
  • Thousands of enterprise systems experienced temporary outages or degraded trust validation.
  • Security teams faced increased workload due to alert fatigue and incident investigations.

In enterprise environments, the removal of root certificates disrupted:

  • Secure web browsing (HTTPS validation failures)
  • Software signing verification
  • Internal enterprise authentication systems

Root Cause Analysis

Microsoft confirmed that the issue was caused by a flawed Security Intelligence signature update. The detection logic mistakenly associated certain DigiCert certificate patterns with known malware behavior linked to the Cerdigent threat family.

Interestingly, this incident may be indirectly linked to a recent security event involving DigiCert, where Extended Validation (EV) code-signing certificates were reportedly abused by threat actors. These compromised certificates may have influenced heuristic detection models, contributing to the false classification.

Microsoft’s Response and Fix

Microsoft responded quickly by releasing updated Security Intelligence definitions to address the issue. The fix included:

  • Removal of the incorrect malware signature
  • Restoration of deleted DigiCert certificates
  • Improved detection logic to prevent recurrence

Users and administrators were advised to:

  1. Update Microsoft Defender Security Intelligence to the latest version
  2. Run a full system scan to ensure proper restoration
  3. Verify certificate trust stores for missing entries

Lessons Learned

This incident highlights the inherent challenges in modern cybersecurity systems:

  • Heuristic detection risks: Advanced detection methods can sometimes misclassify legitimate files.
  • Dependency on trust infrastructure: Root certificates are critical to global digital trust.
  • Need for rapid response: Quick patching is essential to minimize disruption.

It also underscores the importance of maintaining robust monitoring and rollback mechanisms in enterprise environments to mitigate the impact of such false positives.

NeuraCyb's Assessment

While the issue has been resolved, it serves as a reminder of how even trusted security systems can introduce risks when updates go wrong. Organizations must remain vigilant, ensure timely updates, and implement layered security strategies to safeguard against both threats and unintended disruptions.

From a strategic cybersecurity standpoint, this incident illustrates the delicate balance between aggressive threat detection and operational reliability. While AI-driven and heuristic-based engines significantly enhance malware detection capabilities, they also introduce a measurable risk of false positives—especially when interacting with trusted infrastructure components like root certificates.

The rapid remediation by Microsoft demonstrates strong incident response maturity; however, organizations should not rely solely on vendor-side fixes. Implementing layered validation controls, certificate monitoring, and fallback trust mechanisms can significantly reduce business impact in similar scenarios.

Additionally, the potential linkage to abused EV code-signing certificates highlights an evolving attack vector where adversaries exploit trusted channels. This reinforces the need for continuous monitoring of certificate usage and stricter governance around certificate issuance and revocation.

Reference Links and Sources

Imthiyaz Ali
Imthiyaz Ali
Imtiyaz is an experienced Cybersecurity Professional with over 5 years of experience in Cybersecurity Research.