Threat actors using Abused Code-signing certificate from reputable companies as a layer of obfuscation in distributing malicious payloads. Abused Codesigning…