Five ways to secure your code signing processes

We live in a digitalized world that runs on code. Software now permeates virtually every aspect of our lives – from the things we use day-to-day, to the critical infrastructure of our society. At the same time, hackers are becoming increasingly adept in the art of spreading malware. Infamously, this occurred in the SolarWinds attack, where over 18,000 customers downloaded an infected version of the company’s Orion software. They trusted it, because it was digitally signed and authenticated using a code signing machine identity. 

This mode of attack – where hackers implant malware into software as its being built so that it makes it into legitimate software updates – is not new. However, the sophistication and reach of this type of attack has proven to be very successful, and, is likely to encourage others to try. It is paramount that companies prevent this, and while no method will provide a silver bullet, tightening your code signing processes is an important step.

Code signing was a problem; it should have been the solution 

Source link