With the default settings, SecureAPlus checks the software publisher's name in the trusted certificate list.
For example, if the attacker managed to sign as Verisign, although the certificate is valid, but it is not in the trusted certificate list, so the file will still get blocked.
In most cases, spoof certificate usually was signed by untrusted root certificate.
In this case the certificate is invalid, so even the publisher's name is in the trusted certificate list, it will also get blocked.
What if the the attacker sign using a spoof certificate, the publisher's name is in the trusted certificate list, and the root CA is also trusted?
In this case, with the default settings, SecureAPlus will allow it to run.
Set to trust based on certificate's thumbprint, could help in this case.
What if the attacker steal the vendor's certificate? It will have the same publisher's name and thumbprint.
To prevent this kind of attack, turn off the trust by digital signature.