Windows Defender flagged our company digital certificate as Win32/Malgent
Hello everyone,
We are a legitimate software publisher (adlice), and all our applications are digitally signed with an EV code signing certificate.
Recently, Microsoft Defender started detecting binaries signed with our certificate as Trojan:Win32/Malgent. Even though Microsoft fixed the original false positive file by file (hash exclusions), the problem seems to persist — any new file signed with our certificate gets detected again as soon as it’s released.
This is causing repeated quarantines, failed updates, and general trust issues with our signed products.
We are looking for advice or experiences from anyone who has dealt with similar certificate-based false positives in Defender.
- Is there a way to rebuild reputation or reset the certificate’s trust in Microsoft Defender’s cloud?
- Should we contact a specific Microsoft team or follow a particular process for allow-listing?
If anybody from Microsoft can help us escalating this issue, I would appreciate.
Any help, insight, or contact point would be greatly appreciated.
Thank you, Julien