← Back to SOC feed Coverage →

compromised NVIDIA certificates[Lapsus$]

kql MEDIUM Azure-Sentinel
DeviceFileEvents
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-06T23:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may be using compromised NVIDIA certificates linked to the Lapsus$ group to sign malicious files and evade detection. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential supply chain attacks and mitigate lateral movement risks.

KQL Query

DeviceFileCertificateInfo
| where CertificateSerialNumber == "43BB437D609866286DD839E1D00309F5" or CertificateSerialNumber == "14781bc862e8dc503a559346f5dcc518"
| join DeviceFileEvents on SHA1
| distinct DeviceName, FileName, FolderPath, SHA1, SHA256, IsTrusted, IsRootSignerMicrosoft, SignerHash
 //| distinct DeviceName
 //| distinct FileName
 //| summarize mylist = make_list(FileName) by DeviceName

Analytic Rule Definition

id: fa2db236-b846-45b7-b161-00da96717051
name: compromised NVIDIA certificates[Lapsus$]
description: |
  Search for the files that are using a compromised certificate associated with the Lapsus$ group.
  You can remove the comments to:
  1. get the list of devices where there is at least one file signed with the certificate
  2. get the list of files signed with the certificate
  3. get the list of files signed with the certificate group by Devices
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceFileCertificateInfo
  - DeviceFileEvents
tactics:
- Privilege escalation
- Vulnerability
tags:
- Lapsus$
- Nvidia
query: |
 DeviceFileCertificateInfo
 | where CertificateSerialNumber == "43BB437D609866286DD839E1D00309F5" or CertificateSerialNumber == "14781bc862e8dc503a559346f5dcc518"
 | join DeviceFileEvents on SHA1
 | distinct DeviceName, FileName, FolderPath, SHA1, SHA256, IsTrusted, IsRootSignerMicrosoft, SignerHash
  //| distinct DeviceName
  //| distinct FileName
  //| summarize mylist = make_list(FileName) by DeviceName

Required Data Sources

Sentinel TableNotes
DeviceFileEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/compromised nvidia certificates[Lapsus$].yaml