Microsoft Defender Misidentifies Trusted DigiCert Certificates as Malware: What You Need to Know
By ⚡ min read
<h2 id="introduction">Introduction</h2><p>A recent glitch in Microsoft Defender is causing alarm among users by flagging legitimate DigiCert root certificates as dangerous malware. Detected under the alias <strong>Trojan:Win32/Cerdigent.A!dha</strong>, these false-positive alerts have led to the inadvertent removal of trusted certificates from Windows systems, raising concerns about security disruptions and potential connectivity issues. This article explains the scope of the problem, why it occurred, and how affected organizations can respond.</p><figure style="margin:20px 0"><img src="https://www.bleepstatic.com/content/hl-images/2024/01/26/microsoft-red-header.jpg" alt="Microsoft Defender Misidentifies Trusted DigiCert Certificates as Malware: What You Need to Know" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: www.bleepingcomputer.com</figcaption></figure><h2 id="background">Background: The Role of Root Certificates</h2><p>Root certificates are the backbone of digital trust on the internet. Issued by Certificate Authorities (CAs) like <em>DigiCert</em>, they enable secure connections by validating the authenticity of websites, software, and digital signatures. When a root certificate is present in the Windows Trusted Root Certification Authorities store, the operating system automatically trusts any certificate chain rooted to it. Removing or disabling such certificates can break encrypted communications, cause software installation failures, and disrupt everyday computing tasks.</p><h2 id="the-false-positive">The False Positive Incident</h2><p>In late [month/year], Microsoft Defender’s antivirus engine began erroneously tagging DigiCert root certificates as a trojan threat named <strong>Trojan:Win32/Cerdigent.A!dha</strong>. The detection was not limited to a single certificate version; multiple legitimate DigiCert cross-certificates and roots were caught in the net. In some cases, Defender automatically quarantined or removed the certificates from the system store, effectively breaking trust for all DigiCert-issued endpoints.</p><p>Microsoft has since acknowledged the issue on its Defender for Endpoint advisory pages, stating that the detection was a <em>false positive</em> triggered by an overbroad signature rule. The company released a definition update to correct the error, but users who already had certificates removed may need to manually restore them or reinstall the affected certificates from Microsoft Update.</p><h2 id="impact">Impact on Users and Organizations</h2><p>The false positive affected a wide range of Windows environments, from individual PCs to enterprise networks. Common symptoms included:</p><ul><li>Sudden browser warnings that a website’s certificate is not trusted, even for well-known sites like google.com or microsoft.com.</li><li>Failed updates for software that depends on DigiCert-issued code-signing certificates.</li><li>Error messages in event logs indicating that a root certificate could not be found or was invalid.</li><li>Disruption of Virtual Private Network (VPN) connections and other encrypted services.</li></ul><p>Organizations using Microsoft Defender for Endpoint faced additional challenges, as the false alerts could overwhelm security operations centers with non-existent threats. IT administrators had to spend time investigating and clearing the alerts while ensuring that the false removals did not compromise critical business workflows.</p><h3 id="how-to-check">How to Check if Your System Was Affected</h3><p>Users can verify whether their DigiCert certificates were impacted by opening the Microsoft Defender console or the Windows Certificate Manager. Look for any certificates issued by <strong>DigiCert</strong> in the <strong>Trusted Root Certification Authorities</strong> store. If they are missing or show a recent removal date, the false positive likely affected the system.</p><figure style="margin:20px 0"><img src="https://www.bleepstatic.com/images/site/tutorials/nav-header-images/7/375-Tor-headpic.jpg" alt="Microsoft Defender Misidentifies Trusted DigiCert Certificates as Malware: What You Need to Know" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: www.bleepingcomputer.com</figcaption></figure><h2 id="resolution">Resolution and Mitigation Steps</h2><p>Microsoft has released a corrected signature update (version [update number]) that removes the false detection. To prevent further issues:</p><ol><li><strong>Update Microsoft Defender definitions</strong> – Ensure the antivirus engine is up to date. The corrected definitions should automatically block further false positives.</li><li><strong>Restore removed certificates</strong> – If certificates were deleted, run Windows Update or manually import the DigiCert root certificates from Microsoft’s certificate trust list. Alternatively, use the <code>certutl</code> command to re-add them.</li><li><strong>Clear any remaining alerts</strong> – In Microsoft Defender, mark the past detections as allowed or remove them from quarantine to avoid unnecessary notifications.</li><li><strong>Monitor for recurrence</strong> – Although the issue is resolved, Microsoft advises administrators to keep an eye on Defender logs for any similar anomalies.</li></ol><p>For enterprise users, group policies can be used to push the corrected definitions and force a certificate refresh across the network.</p><h2 id="conclusion">Conclusion</h2><p>False positives like the <strong>Trojan:Win32/Cerdigent.A!dha</strong> incident highlight the delicate balance between security software and the trust infrastructure it aims to protect. While Microsoft Defender is a robust antivirus solution, no detection engine is perfect. Organizations should maintain backups of their certificate stores and have a rollback plan for such anomalies. In the meantime, ensuring that Defender definitions are kept current is the simplest way to avoid this particular glitch. If you suspect your certificates were removed, follow the steps above to restore trust and resume normal operations.</p><p><em>Note: This article updates information from the original discovery; for the latest official response, refer to Microsoft’s support documentation.</em></p>