Supply ChainApr 29, 2026
"On 2026-04-02, a threat actor contacted DigiCert's support team via a customer chat channel and...
Threat actor targets DigiCert support via malicious ZIP file in customer chat.
Summary
On April 2, 2026, a threat actor contacted DigiCert's support team through a customer chat channel and delivered a ZIP file disguised as a screenshot, containing a malicious .scr executable. CrowdStrike and other security measures successfully blocked the payload. This incident highlights supply chain risks targeting critical certificate infrastructure vendors.
Indicators of Compromise
- url — https://t.co/BtDkmBZVn8
- malware — .scr executable payload
Entities
DigiCert (vendor)CrowdStrike (vendor)DigiCert Support Channel Attack (2026-04-02) (campaign)