Security

Fox Tempest Malware Signing Service Disrupted

3 min read

Summary

Microsoft has disrupted Fox Tempest, a malware-signing-as-a-service operation that helped cybercriminals make ransomware and other malware appear legitimately signed. The takedown matters because the group abused Microsoft Artifact Signing, created more than 1,000 fraudulent certificates, and enabled attacks that could bypass security controls more easily.

Need help with Security?Talk to an Expert

Introduction

Microsoft has detailed the disruption of Fox Tempest, a financially motivated threat actor that operated a malware-signing-as-a-service (MSaaS) platform for other cybercriminals. This is significant for security teams because signed malware is more likely to evade defenses, appear trustworthy to users, and succeed in ransomware delivery.

What’s new

Microsoft disrupts Fox Tempest infrastructure

  • In May 2026, Microsoft’s Digital Crimes Unit (DCU), with industry partners, disrupted Fox Tempest’s service and supporting infrastructure.
  • Microsoft also revoked more than 1,000 code-signing certificates linked to the operation.

Abuse of Microsoft Artifact Signing

  • Fox Tempest abused Microsoft Artifact Signing (formerly Azure Trusted Signing) to obtain short-lived certificates valid for 72 hours.
  • These certificates made malware look legitimately signed, helping threat actors bypass some security controls.

Broad cybercrime enablement

  • Microsoft says Fox Tempest enabled the delivery of Rhysida ransomware and malware families including Oyster, Lumma Stealer, and Vidar.
  • The actor has been linked to ransomware activity involving groups such as Vanilla Tempest, Storm-0501, Storm-2561, and Storm-0249.

Evolving delivery model

  • The service initially operated through signspace[.]cloud, where customers uploaded files for signing.
  • In early 2026, Fox Tempest shifted to pre-configured VMs hosted through Cloudzy, streamlining signed malware delivery for customers.

Why it matters for defenders

Fox Tempest did not directly attack victims. Instead, it provided a critical supporting service to ransomware affiliates and malware operators. That makes this case especially important for IT and security administrators: disrupting access to trusted code-signing can reduce the effectiveness of downstream attacks across multiple threat groups.

Organizations in healthcare, education, government, and financial services were among those affected globally. Because signed binaries can appear legitimate, defenders should not treat digital signatures alone as proof that software is safe.

  • Review Microsoft Defender detections and indicators of compromise published with the report.
  • Hunt for suspicious signed binaries, especially those masquerading as common tools such as AnyDesk, Teams, PuTTY, or Webex.
  • Investigate recent malware activity tied to malvertising, SEO poisoning, and fake software downloads.
  • Tighten controls around application execution, including allowlisting and reputation-based protection.
  • Monitor for unusual Azure-related artifacts, suspicious certificate usage, and short-lived signing activity.
  • Educate users to verify software sources and avoid sponsored or poisoned search results.

Bottom line

The Fox Tempest disruption highlights how trusted-signing abuse has become a force multiplier for ransomware operators. Security teams should use Microsoft’s published detections and IOCs to validate exposure, strengthen defenses, and reduce the risk from signed malware.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Fox Tempestmalware signingransomwareMicrosoft Defenderthreat intelligence

Related Posts

Security

@antv npm Attack Hits CI/CD Secrets and Tokens

Microsoft has disclosed an active supply chain attack involving compromised @antv npm packages that used malicious preinstall scripts to steal credentials from GitHub Actions and other CI/CD environments. The campaign matters because it spread through popular downstream dependencies, putting developer pipelines, cloud secrets, and software supply chains at risk.

Security

Microsoft Gaming Security: Key Risks and Defenses

Microsoft’s latest Deputy CISO post explains why securing gaming requires a different approach than traditional enterprise IT. The company outlines the distinct risks across gaming platforms, studios, and shared central teams, and highlights how Entra ID, Purview, Defender for Cloud, and Sentinel help balance security with player experience and developer agility.

Security

Microsoft RAMPART and Clarity Open-Sourced

Microsoft has open-sourced RAMPART and Clarity, two tools aimed at improving safety in agentic AI development. RAMPART brings repeatable adversarial and regression testing into CI pipelines, while Clarity helps teams challenge design assumptions early before code is written.

Security

Storm-2949 Cloud Breach: Entra ID to Azure Attack

Microsoft detailed how Storm-2949 turned a socially engineered Microsoft Entra ID compromise into broad data theft across Microsoft 365 and Azure. The case highlights how identity attacks can escalate quickly through legitimate cloud management features, making stronger MFA controls, monitoring, and cross-platform detections critical for defenders.

Security

Microsoft Security for SMBs in an AI-Powered World

Microsoft is urging small and medium businesses to treat cybersecurity as a core business risk as AI makes phishing, malware, and identity attacks faster and more effective. The company highlights Microsoft 365 Business Premium and integrated security controls as a practical way for growing businesses to protect users, devices, email, and cloud apps without adding major complexity.

Security

Autonomous AI Agents: Microsoft Defense-in-Depth

Microsoft outlines a defense-in-depth approach for securing autonomous AI agents as they move from assisting users to taking actions across systems. The guidance emphasizes that the application layer—not just the model—is the most important control point for limiting permissions, enforcing human review, and reducing blast radius in production.