Code Signing Reading Time: 3 minutes

GitHub Revokes Stolen Code Signing Certificates

Code signing certificates play a vital role in establishing trust and ensuring the integrity of software applications. They provide a means for developers to verify the authenticity of their code, assuring users that it has not been tampered with or compromised. However, recent events have highlighted the risks associated with stolen code signing certificates, leading to concerns about the security of software distributed through trusted channels.

In a significant incident, GitHub, one of the largest software development platforms, was targeted by attackers who gained unauthorized access to several of its repositories. The attackers stole source code and obtained code signing certificates used to sign software distributed through GitHub’s platform. This incident raised alarm bells within the software development community and triggered a swift response from GitHub to revoke the compromised certificates.

The Importance of Code Signing Certificates

Code signing certificates serve as digital signatures threats for software code. Code signing certificates, when compromised or misused, can potentially act as a threat to software code. They assure that the code originates from a trusted source and has not been modified during transit or storage. Code signing offers several benefits, including:

  • Authenticity

    Code signing certificates enable users to verify the identity of the software developer or publisher. This establishes trust and confidence in the software’s legitimacy.

  • Integrity

    The digital signature associated with a code signing certificate ensures that the code has not been tampered with or altered since it was signed. Any modifications to the code would invalidate the signature, alerting users to potential risks.

  • Security

    Code signing certificates protect against malware and unauthorized software. They act as a deterrent to attackers seeking to distribute malicious code under the guise of legitimate software.

The GitHub Incident

In the GitHub incident, attackers gained unauthorized access to repositories and exfiltrated source code. However, the more concerning aspect was the theft of code signing certificates associated with the affected repositories. Code signing certificates are valuable assets for attackers as they allow them to sign malicious code with the appearance of legitimacy.

The theft of code signing certificates raised significant concerns within the software development community. If attackers were to use these certificates to sign malicious software, unsuspecting users might unknowingly install and execute compromised applications. This could lead to various consequences, including data breaches, system compromise, and unauthorized access to sensitive information.

GitHub’s Response

GitHub immediately addressed the compromised code signing certificates. Their response included the following measures:

  • Revoking Certificates

    GitHub promptly revoked the stolen code signing certificates, rendering them invalid. This action ensured that any software signed with those certificates would be recognized as untrusted by systems that check the validity of the signatures.

  • Notifying Users

    GitHub proactively communicated the incident to affected users and guided the steps they should take to protect themselves. This included recommending the regeneration of new certificates and updating software to use the new certificates.

  • Enhancing Security Measures

    GitHub implemented additional security measures to prevent similar incidents in the future. These measures included strengthening access controls, improving monitoring capabilities, and enhancing authentication mechanisms.

  • Collaboration with Certificate Authorities

    GitHub worked closely with certificate authorities to ensure the revocation of compromised certificates and prevent misuse. This collaboration helped reinforce the trustworthiness of software distributed through GitHub’s platform.

Mitigating Risks and Best Practices

To mitigate the risks associated with stolen code signing certificates, organizations and developers can adopt the following best practices:

  • Robust Access Controls

    Implement strong access controls and authentication mechanisms to protect code signing certificates and prevent unauthorized access.

  • Secure Key Management

    Employ key management practices, such as encryption and secure storage, to safeguard code signing certificates and private keys.

  • Regular Certificate Audits

    Conduct periodic audits of code signing certificates to detect anomalies or unauthorized use. Monitor certificate validity and expiration dates to ensure timely renewal and revocation when necessary.

  • Multi-Factor Authentication (MFA)

    Enable MFA for code signing certificate management to add an extra layer of security and prevent unauthorized access.

  • Incident Response Planning

    Develop and maintain an incident response plan that outlines the steps to be taken in the event of a compromised code signing certificate. This includes procedures for certificate revocation, communication with affected users, and remediation measures.


The theft of code signing certificates significantly threatens the integrity and security of software distributed through trusted channels. The GitHub incident highlighted the potential consequences and the need for swift action to mitigate these risks. By promptly revoking compromised certificates, notifying users, and implementing enhanced security measures, GitHub demonstrated its commitment to maintaining the trust of its developer community.

As software developers and organizations, it is crucial to prioritize the protection of code signing certificates and implement best practices to prevent unauthorized access and misuse. By doing so, we can safeguard the integrity of our software applications and maintain the trust of users who rely on them for secure and reliable functionality.

Free Downloads

Datasheet of Code Signing Solution

Code signing is a process to confirm the authenticity and originality of digital information such as a piece of software code.


About the Author

Ambika Rastogi is a Consultant at Encryption Consulting, working with PKIs, HSMs, and working as a consultant with high-profile clients.

Explore the full range of services offered by Encryption Consulting.

Feel free to schedule a demo to gain a comprehensive understanding of all the services Encryption Consulting provides.

Request a demo