Connectwaiz is warning customers that it is rotating the digital code signing certificate, which is used to signed Screenconts, Connectwaiz Automats and Connectwaiz RMM execution.
The digital certificate is used to sign the executable so that the people downloading the files know that they come from a reliable source. This ensures that the code has not been tampered with before reaching the final user.
According to Connectwaiz, it was decided after the third-party security researcher how some configuration data could be misused by the danger actors.
An email viewed by Blapping Copper states, “We are updating the digital signing certificate used in connectivity, automatic and RMMs used in RMM, which is due to concerns raised by a third-party researcher that the screens can be potentially misused by a bad actor.
“This potential misuse is related to a configuration handling problem with a Schenconnect installer, which will require system-level access.”
Connectwaiz underlines that the action is unrelated to any security incidents, especially the nation-state-state cyber attacks faced by the previous month.
“In addition to issuing new certificates, we are issuing an update to improve this configuration data,” further one tells ” Advisor on your website,
The credges under consideration are issued by Digikert, who were going to cancel the connecting certificates on ET at 10:00 on Tuesday, June 10 at 10:00 on Tuesday, June 10. However, Connectwiz was able to get an extension on ET at 8:00 pm on Friday, June 13, 2025, it is likely that the new scraper version 25.4 buildings that use new certificates were not available.
The action will affect both on-radius and cloud users, who will have to complete the deadline to avoid operating disruptions.
Connectwaiz says that the automatic build is already out, while the Screenconnect build should be ready soon.
Users are recommended to go to the seller’s ‘university page’ to download the update build and find FAQ.
Those using automatic, screenc itect, or cloud-hosted versions of RMM, will automatically receive certificates and updates to certificates and agents, but the roll-out is becoming progressively.
These users should still check that their agents are up -to -date to ensure updated service before June 13.
While Connectwaiz did not share the details of why the certificates were being rotated, Sophos’s researcher Andrew Brant warned in April that the danger actor was using fishing sites, who disguise the pre-configured connectivated connectivity clients as social security details (Wirstotal,
“A spammer is distributing a connecting commercial remote access client application as a payload in a scam that uses the alleged arrival of American social security details, as its hook,” Explained the brant on Mastodon,
Although he was an installer East-Configure with the server of the attackersThey still add additional confidence in the executable, shown as digitally signed.
It is not clear that such attacks gave rise to rotation of certificates signing the code.
Bleepingcomputer contacted to contact connectwaise as to whether it is related and learn more about why the certificates were being rotated, but we were sent back to the advisor only.