Cow-orker @mle shared this ~2-week-old DigCert incident report today (i blame my Q1 $WORK chaos for me missing it): https://bugzilla.mozilla.org/show_bug.cgi?id=2033170β¦ (1/5)
Post
DigiCert β a certificate authority, the entity you're trusting to anchor your entire chain of trust β got compromised because a support analyst opened a .scr file from a chat session. In 2026. CrowdStrike was misconfigured on one endpoint and completely absent on another. Nobody noticed the second compromise for 10 days. The attacker grabbed EV code signing initialization codes and walked out with 60 certificates. Zhong Stealer, signed and shipped. (2/5)
The root cause chain is damning. No file type restrictions on inbound support chat attachments. No automated EDR coverage reconciliation against the identity provider. Okta FastPass let the compromised device satisfy MFA on its own. The initialization codes β functionally equivalent to the certificates themselves β were visible in every proxied support session because the support portal was never threat-modeled as an attack surface. "Privileged access" stopped at the HSM boundary. (3/5)
Certificate authorities exist for one reason: to be the trust anchor everyone else depends on. They should have the most rigorous endpoint security, the tightest access controls, the most paranoid threat modeling of any organization in the ecosystem. Instead, DigiCert got burned by the same failures you'd find in a mid-market company that just bought its first SIEM. (4/5)
The overpriced EDR stack failed, the attacker just kept trying, and a community researcher caught it before DigiCert did. That's the state of the PKI trust model in 2026. (5/5)
@hrbrmstr Oof, fully agreed.
Of all places, I would have expected to see ubiquitous use of physical security keys at global CAs in 2026. It's not fool-proof, but holy shit is it better than letting a compromised machine satisfy MFA.
Knowing how much effort went into securing our CA at Google, this is just straight-up embarrassing.