False Alarm: Microsoft Defender vs. DigiCert Root Certificates

A widespread security incident occurred on May 3, 2026, when a faulty Microsoft Defender signature update (version 1.449.424.0) began incorrectly flagging legitimate DigiCert Root Certificates as high-severity malware. The detection, labeled Trojan:Win32/Cerdigent.A!dha, caused panic among IT departments worldwide as the “infection” appeared on thousands of clean systems simultaneously.


1. The “Cerdigent” False Positive

The “Trojan” alert wasn’t actually a virus; it was a hash mismatch error. Microsoft’s security engine began targeting the cryptographic fingerprints of two essential internet building blocks:

  • DigiCert Assured ID Root CA

  • DigiCert Trusted Root G4

These certificates are stored in the Windows Registry. Because Defender identified them as a “Trojan,” it followed its standard protocol: it quarantined the registry entries, effectively deleting them from the system’s trusted root store.


2. The Impact: A “Broken” Internet

Since these certificates are used to verify the identity of millions of websites and software packages, their removal caused immediate downstream failures:

  • SSL/TLS Failures: Browsers like Edge and Chrome began throwing “Connection Not Private” errors for secure websites.

  • Code-Signing Breaks: Legitimate software and drivers signed by DigiCert failed to run, as Windows could no longer verify their authenticity.

  • Administrative Chaos: IT admins saw hundreds of “Severe” alerts in their dashboards, leading some to trigger emergency isolation protocols or even wipe/reset systems unnecessarily.


3. The Fix: Version 1.449.430.0

Microsoft acknowledged the error and released a corrective update within hours.

  • Auto-Correction: Signature version 1.449.430.0 (and later) contains logic that not only stops the detection but automatically restores the quarantined certificates.

  • Verification: If you were affected, you can verify your system is clean by checking your Defender version or running the following command in PowerShell:

    certutil -store AuthRoot | findstr -i "digicert"


4. Summary of the Incident

Feature Faulty Detection (May 3, 2026) The Reality
Detection Name Trojan:Win32/Cerdigent.A!dha False Positive
Targeted Files Registry entries for DigiCert Trusted Root Certificates
Remediation Automatic Quarantine SSL/TLS & Code-Signing Failure
Status Critical Threat Resolved (Update .430+)

Leave a Reply

Your email address will not be published. Required fields are marked *