Fox Tempest Malware Signing Service Disrupted
Summary
Microsoft has disrupted Fox Tempest, a malware-signing-as-a-service operation that helped cybercriminals make ransomware and other malware appear legitimately signed. The takedown matters because the group abused Microsoft Artifact Signing, created more than 1,000 fraudulent certificates, and enabled attacks that could bypass security controls more easily.
Introduction
Microsoft has detailed the disruption of Fox Tempest, a financially motivated threat actor that operated a malware-signing-as-a-service (MSaaS) platform for other cybercriminals. This is significant for security teams because signed malware is more likely to evade defenses, appear trustworthy to users, and succeed in ransomware delivery.
What’s new
Microsoft disrupts Fox Tempest infrastructure
- In May 2026, Microsoft’s Digital Crimes Unit (DCU), with industry partners, disrupted Fox Tempest’s service and supporting infrastructure.
- Microsoft also revoked more than 1,000 code-signing certificates linked to the operation.
Abuse of Microsoft Artifact Signing
- Fox Tempest abused Microsoft Artifact Signing (formerly Azure Trusted Signing) to obtain short-lived certificates valid for 72 hours.
- These certificates made malware look legitimately signed, helping threat actors bypass some security controls.
Broad cybercrime enablement
- Microsoft says Fox Tempest enabled the delivery of Rhysida ransomware and malware families including Oyster, Lumma Stealer, and Vidar.
- The actor has been linked to ransomware activity involving groups such as Vanilla Tempest, Storm-0501, Storm-2561, and Storm-0249.
Evolving delivery model
- The service initially operated through signspace[.]cloud, where customers uploaded files for signing.
- In early 2026, Fox Tempest shifted to pre-configured VMs hosted through Cloudzy, streamlining signed malware delivery for customers.
Why it matters for defenders
Fox Tempest did not directly attack victims. Instead, it provided a critical supporting service to ransomware affiliates and malware operators. That makes this case especially important for IT and security administrators: disrupting access to trusted code-signing can reduce the effectiveness of downstream attacks across multiple threat groups.
Organizations in healthcare, education, government, and financial services were among those affected globally. Because signed binaries can appear legitimate, defenders should not treat digital signatures alone as proof that software is safe.
Recommended next steps
- Review Microsoft Defender detections and indicators of compromise published with the report.
- Hunt for suspicious signed binaries, especially those masquerading as common tools such as AnyDesk, Teams, PuTTY, or Webex.
- Investigate recent malware activity tied to malvertising, SEO poisoning, and fake software downloads.
- Tighten controls around application execution, including allowlisting and reputation-based protection.
- Monitor for unusual Azure-related artifacts, suspicious certificate usage, and short-lived signing activity.
- Educate users to verify software sources and avoid sponsored or poisoned search results.
Bottom line
The Fox Tempest disruption highlights how trusted-signing abuse has become a force multiplier for ransomware operators. Security teams should use Microsoft’s published detections and IOCs to validate exposure, strengthen defenses, and reduce the risk from signed malware.
Need help with Security?
Our experts can help you implement and optimize your Microsoft solutions.
Talk to an ExpertStay updated on Microsoft technologies