Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Next.js & React Server Components: Critical Vulnerabilities Pat
May 8, 2026
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
Home/CyberSecurity News/Microsoft Suspends Dev Accounts of High-Profile Developer Open-Source
CyberSecurity News

Microsoft Suspends Dev Accounts of High-Profile Developer Open-Source

Microsoft has suspended the Windows Hardware Program developer accounts for two critical open-source security projects, VeraCrypt and WireGuard. This action immediately blocked their ability to sign...

David kimber
David kimber
April 9, 2026 3 Min Read
5 0

Microsoft has suspended the Windows Hardware Program developer accounts for two critical open-source security projects, VeraCrypt and WireGuard. This action immediately blocked their ability to sign drivers and distribute updates to millions of Windows users. Developers confirmed they received no prior warning or explanation for the suspension.

Mounir Idrassi, the lead developer of VeraCrypt, revealed in a March 30 post on SourceForge that Microsoft had abruptly terminated the account he had relied on for years to sign Windows drivers and the bootloader.

“I didn’t receive any emails from Microsoft nor any prior warnings,” Idrassi told 404 Media. Days later, Jason Donenfeld, creator of the widely used WireGuard VPN protocol, disclosed that he had faced an identical lockout without any notification from Microsoft about a new identity verification requirement. VPN provider Windscribe also reported a similar account suspension, suggesting a broader enforcement sweep.

It appears @Microsoft is actively suspending developer accounts with no warning or reason of various security tools like VeraCrypt, WireGuard and also Windscribe. We’ve had this VERIFIED account for 8+ years to sign our drivers.

We’ve been trying to resolve this for over a… https://t.co/iwkryuwKuO pic.twitter.com/7VcnAQIbnP

— Windscribe (@windscribecom) April 8, 2026

A Microsoft developer account is required to authenticate third-party drivers on Windows 10 and 11. Without a valid, signed driver, Windows marks it as unsigned and prevents it from loading at the kernel level, making new builds functionally undeliverable to end users.

Suspended Developer Accounts

The suspensions appear to stem from Microsoft’s tightening of identity verification policies under its Partner Center program. Microsoft began enforcing stricter MFA and identity verification requirements beginning October 2025, with full API enforcement kicking in on April 1, 2026.

The new policy requires developers to undergo re-verification through trusted third-party identity verification vendors (IDVs) using government-issued ID documents. Accounts where identity verification is rejected and no “Fix now” option is presented are automatically suspended with no further recourse.

Neither Idrassi nor Donenfeld appears to have been notified that re-verification was required, leaving both developers effectively caught off guard.

The impact extends far beyond a bureaucratic inconvenience. VeraCrypt is one of the most trusted open-source disk encryption tools for Windows, relied upon by privacy-conscious individuals, journalists, and enterprises worldwide.

Idrassi has warned that if the issue remains unresolved, Secure Boot will refuse to allow VeraCrypt to encrypt system drives as of June 2026, describing the situation as a potential “death sentence for VeraCrypt”.

For WireGuard, the suspension means Donenfeld cannot ship updates to WireGuard for Windows, leaving users potentially exposed if a vulnerability is discovered in the interim.

The incident drew swift attention from inside Microsoft itself. Developer advocate Scott Hanselman stepped in, reaching out directly to both developers via email and pledging to expedite a resolution.

As of April 9, resolutions are expected shortly, though both developers are currently navigating a 60-day appeals process with no guaranteed outcome. The episode has reignited criticism over the fragility of critical open-source infrastructure when it depends on a single vendor’s gatekeeping mechanisms.

This incident underscores a systemic risk: open-source security projects that underpin global privacy infrastructure remain dangerously dependent on opaque, automated enforcement systems at large platforms.

When those systems misfire silently and without appeal pathways, the downstream consequences for end-user security can be severe and immediate.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

SecurityVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Critical Chrome Vulnerabilities Allow Arbitrary Code Execution

Next Post

Hackers Claim to Have Stolen 10 Petabytes of Data from China’s

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Palo Alto Firewall Zero-Day RCE Act Networks Vulnerability
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us