Leaked Nvidia certificates used to sign malware bypassing Windows detection
Windows admins are advised to implement custom policies to avoid seemingly legitimate malware making its way into corporate environments


Security researchers have discovered malware being signed with Nvidia code signing certificates days after the LAPSUS$ group leaked a trove of the company’s stolen files.
Part of the stolen files included two code signing certificates and although they’re now expired, signing malware with them will still influence Windows into loading the malware onto systems.
Windows typically rejects drivers or executables signed using expired certificates. If the certificate was issued after 29 July 2015 then it would require a timestamp - a method of using trusted certificates after expiration - but certificates issued before that date, as in the case of these two Nvidia certificates, Windows will accept them without timestamps, expired or not, said Bill Demirkapi, offensive security at Zoom.
Such certificates are used so Windows users can verify the authenticity of any given driver or application. Signing malware with a legitimate, although expired certificate means Windows will be convinced the application is genuine and has not been modified by a third party.
Among the types of malware already discovered to be signed with Nvidia’s code signing certificates are Mimikatz, Cobalt Strike beacons, and remote access trojans, according to VirusTotal searches.
RELATED RESOURCE
The best defence against ransomware
How ransomware is evolving and how to defend against it
"The recent Nvidia security breach involving certificate abuse is eerily like the one Opera suffered in 2013 and one that Adobe reported in 2012," said Pratik Selva, senior security engineer at Venafi. "If organisations do not properly secure the process and the infrastructure for managing code signing certificates, the likelihood of abuse, as well as the impact of any compromise, are both extremely high.
"Although the certificates have expired, Windows will still allow a driver signed by a company to be installed so that it still constitutes a risk," said Alexis Vanden Eijnde, senior security consultant at Prism Infosec. "Microsoft should soon add the certificates to their revocation list and this will prevent the malicious drivers signed by stolen certificates from being loaded into Windows."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Windows admins are advised to create custom policies in Windows Defender Application Control to filter out the approvals for specific signed certificates.
The Lapsus hacking group said last week Nvidia had until Friday 4 March 2022 to completely open source its GPU drivers across all operating systems or the complete collection of stolen files would be leaked online.
The group has provided few updates since the deadline has passed apart from announcing its second major leak in as many weeks. LAPSUS$ said on Friday that it obtained an array of source code belonging to Samsung which could lead to access to the “lowest level” of devices such as its Galaxy series of smartphones.

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
The Race Is On for Higher Ed to Adapt: Equity in Hyflex Learning
By ITPro
-
Google faces 'first of its kind' class action for search ads overcharging in UK
News Google faces a "first of its kind" £5 billion lawsuit in the UK over accusations it has a monopoly in digital advertising that allows it to overcharge customers.
By Nicole Kobie
-
GoDaddy data breach exposes over 1.2 million customer details
News Attacker had access to admin passwords for over two months
By Danny Bradbury
-
Why is SSL under attack?
In-depth Don't get sidetracked by a storm in the SSL teacup, warns Davey Winder...
By Davey Winder
-
Facebook warns of new Superfish threat
News The fake security certificate used by the Lenovo-installed adware can be re-used by hackers, says social network
By Joe Curtis
-
OS X Mavericks update to fix major security flaw in Macs
News Apple follows iOS 7 update with Mac OS X Mavericks patch to address encryption issues.
By Caroline Donnelly
-
Who to trust after the VeriSign hack?
In-depth Davey Winder questions what data was stolen from VeriSign and wonders why the company hasn't been more forthcoming.
By Davey Winder
-
SSL under threat as flaw exploited
News Fears over the security credentials of SSL rise after researchers claim to have found a way to exploit a long-known vulnerability.
By Tom Brewster
-
MI6 targeted in DigiNotar hack
News MI6, the CIA and Facebook were all targeted following a hack on certificate authority DigiNotar.
By Tom Brewster
-
Major SSL encryption flaw hits the web
News Tech companies using SSL have some serious work to do to fix a big hole that could leave internet users at risk.
By Asavin Wattanajantra