Threat actors are known to sign their malware using stolen, or even legally acquired, code signing certificates. This threat is…